Origin Energy completes troubled SAP transformation 
By Allie Coyne | 3 days ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Chinese hacked US military contractors 
3 days ago | Comment Now 
Senate panel releases report.
 
Govts pressure Google for more user data 
By Allie Coyne | 5 days ago | Comment Now 
Australian requests dip slightly.
 
Microsoft defies order to hand over user emails 
Sep 1, 2014 | Comment Now 
US judge unfreezes search warrant.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
CSIRO drones tackle rainforest weeds 
By Juha Saarinen | Aug 29, 2014 | Comment Now 
UAVs safer and more efficient than manned flights.
 
IBM launches SoftLayer cloud in Melbourne, Sydney 
By Penny Wolf | Aug 26, 2014 | Comment Now 
Melbourne live next month, Sydney to follow.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
NICTA open sources seL4 secure OS 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Released under GPL v2.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Sydney Trains brings train data into the digital era 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Aims to deliver travellers better information.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Hostworks gives CSIRO analytics tools a second life 
By Brett Winterford | Jul 3, 2014 | Comment Now 
Local hoster to take on Salesforce.com, Amazon.
 
Swinburne downs systems for major kit upgrade 
By Allie Coyne | Jun 24, 2014 | Comment Now 
Replaces network, identity management; plots cloud.
 
CSIRO staff to hold protest meetings over job cuts 
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1091

Vote