Federal Govt unveils cloud services panel terms 
By Paris Cowan | Aug 5, 2014 | Comment Now 
But cloud market is not mature enough to make it mandatory.
 
Finance to launch revised whole-of-govt hardware panel 
 
Govt appoints first partners to new data centre panel 
By Allie Coyne | Jul 9, 2014 | Comment Now 
New arrangements focus on services over leases.
 
Finance advises on how to avoid ‘big brother’ effect  
By Paris Cowan | Jun 30, 2014 | Comment Now 
Commonwealth issues ethical guidelines for data analytics.
 
Govt lays groundwork for shared services, job cuts 
 
Finance begins work on whole-of-gov cloud panel 
By Paris Cowan | May 14, 2014 | Comment Now 
Wants to know what you think.
 
Australian Government abandons CIO role 
By Paris Cowan | May 7, 2014 | Comment Now 
AGIMO restructured.
 
Former Aus Govt CIO Archer joins Gartner 
By Paris Cowan | Apr 28, 2014 | Comment Now 
Takes on e-govt research role.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Federal govt re-considers IT shared services 
By Paris Cowan | Mar 4, 2014 | Comment Now 
Troubled model re-emerges thanks to budget strife.
 
Glenn Archer resigns as Aus Govt CIO 
By Paris Cowan | Jan 31, 2014 | Comment Now 
Effective immediately.
 
Canberra promises new IT strategy in 2014 
By Paris Cowan | Nov 14, 2013 | Comment Now 
Realigned with Coalition election promises.
 
Govt finds one third of open data was "junk" 
By Allie Coyne | Nov 12, 2013 | Comment Now 
Cleans out data.gov.au
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
DFAT $715m upgrade wrestles with dying hardware 
By John Hilvert | Oct 11, 2013 | Comment Now 
Mobile to feature in new strategy.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 449

Vote