IBM puts $3bn toward chip breakthrough 
Jul 10, 2014 | Comment Now 
Five-year investment.
 
Qantas checks in with cloud computing 
By Brett Winterford | Jul 8, 2014 | Comment Now 
Impressed with results of public cloud bake-off.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Apple brings two-factor authentication to iCloud 
By Juha Saarinen | Jul 1, 2014 | Comment Now 
Covers cloud based services and productivity apps.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
US charges two more in IBM insider trading case 
Jun 26, 2014 | Comment Now 
Join Australian man as list of charged grows.
 
Google gives businesses unlimited cloud storage 
By Juha Saarinen | Jun 26, 2014 | Comment Now 
Claims 190 million users.
 
Will IBM pip Azure at the Aussie cloud post? 
By Brett Winterford | Jun 24, 2014 | Comment Now 
[Blog post] Spoiling the biggest launch party of the year.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
AIIA defends "justifiably" higher Aussie IT prices 
By Allie Coyne | Jun 16, 2014 | Comment Now 
Says changes to law would be anti-competitive.
 
Samsung focuses on screen with new flagship tablet 
 
Jeff Smith quits Suncorp for IBM 
By Brett Winterford | Jun 13, 2014 | Comment Now 
Moves back to the US.
 
EU to investigate Apple's Irish tax breaks 
Jun 12, 2014 | Comment Now 
Commission investigating tax deals.
 
EU investigates Apple tax rulings 
Jun 12, 2014 | Comment Now 
Complicated tax structures targeted.
 
Understanding the economics of IT risk and reputation 
Jun 11, 2014 | Comment Now 
Making the business case for business continuity and IT security
 
Five essentials for better work force continuity 
Jun 11, 2014 | Comment Now 
Integrating the human side into your strategy
 
Building the business case for continuity and resiliency 
Jun 11, 2014 | Comment Now 
The economics of IT risk and reputation and their importance to business continuity and resiliency professionals.
 
Hewlett-Packard enters the supercomputer game 
By Penny Wolf | Jun 11, 2014 | Comment Now 
Launches water-cooled server.
 
Suspected Apple hackers arrested in Russia 
 
Securing Apple iOS8 
By Steve Gold | Jun 6, 2014 | Comment Now 
It is more open, but can it be protected?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 650

Vote