Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Federal Govt unveils cloud services panel terms 
By Paris Cowan | Aug 5, 2014 | Comment Now 
But cloud market is not mature enough to make it mandatory.
 
Finance to launch revised whole-of-govt hardware panel 
 
Govt appoints first partners to new data centre panel 
By Allie Coyne | Jul 9, 2014 | Comment Now 
New arrangements focus on services over leases.
 
Finance advises on how to avoid ‘big brother’ effect  
By Paris Cowan | Jun 30, 2014 | Comment Now 
Commonwealth issues ethical guidelines for data analytics.
 
Govt lays groundwork for shared services, job cuts 
 
Finance begins work on whole-of-gov cloud panel 
By Paris Cowan | May 14, 2014 | Comment Now 
Wants to know what you think.
 
Australian Government abandons CIO role 
By Paris Cowan | May 7, 2014 | Comment Now 
AGIMO restructured.
 
Former Aus Govt CIO Archer joins Gartner 
By Paris Cowan | Apr 28, 2014 | Comment Now 
Takes on e-govt research role.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Federal govt re-considers IT shared services 
By Paris Cowan | Mar 4, 2014 | Comment Now 
Troubled model re-emerges thanks to budget strife.
 
Glenn Archer resigns as Aus Govt CIO 
By Paris Cowan | Jan 31, 2014 | Comment Now 
Effective immediately.
 
Canberra promises new IT strategy in 2014 
By Paris Cowan | Nov 14, 2013 | Comment Now 
Realigned with Coalition election promises.
 
Govt finds one third of open data was "junk" 
By Allie Coyne | Nov 12, 2013 | Comment Now 
Cleans out data.gov.au
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
DFAT $715m upgrade wrestles with dying hardware 
By John Hilvert | Oct 11, 2013 | Comment Now 
Mobile to feature in new strategy.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 259

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 82

Vote