Will Nutanix be outflanked before reaching IPO? 
By Justin Warren | 19 hours ago | Comment Now 
VMware muscles in on storage startup in hyper-converged infrastructure.
 
IBM launches SoftLayer cloud in Melbourne, Sydney 
By Penny Wolf | 1 day 18 hours ago | Comment Now 
Melbourne live next month, Sydney to follow.
 
UPS reveals data breach across 51 US stores 
5 days ago | Comment Now 
User details compromised.
 
Photos: Symantec opens APAC SecOps Centre 
By Juha Saarinen | 5 days ago | Comment Now 
Global intelligence network for security threat detection comes to Sydney.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | Aug 19, 2014 | Comment Now 
IT transformation starts to reap results.
 
Apple onshores China customers’ personal data 
Aug 17, 2014 | Comment Now 
Denies risk to user’s privacy.
 
Cisco restructuring to cost $751 million 
Aug 15, 2014 | Comment Now 
Up to $375 million to be recognised in the first quarter.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Cisco to cut 6000 jobs as sales decline 
Aug 14, 2014 | Comment Now 
Third round of layoffs in as many years.
 
Global internet outages caused by routing table spike 
By Juha Saarinen | Aug 14, 2014 | Comment Now 
Network routers hit capacity limits.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt FinFisher spyware exposed after data breach 
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
'Epic Turla' hack infiltrates govts, spy agencies 
By Jim Finkle | Aug 8, 2014 | Comment Now 
Are the Russians behind it?
 
China's IT security gamble 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
[Blog post] Can Chinese antivirus vendors fill Symantec and Kaspersky's shoes?
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Vatican entangled in HP, Autonomy stoush 
Jul 21, 2014 | Comment Now 
Dispute sheds light on HP case in troubled deal.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 565

Vote