Tags: analysisRemove, citiRemove, s7Remove, 417Remove

Supercomputers to power $5.4m oil exploration project 
By Penny Wolf | Jun 13, 2014 | Comment Now 
Australia's universities hired by energy giants.
 
Citi chases high-flying customers with global banking platform 
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Big business culture leading to big data failure 
By Tiberio Caetano | Mar 28, 2014 | Comment Now 
Cultural, operational shift required.
 
Turnbull's NBN policy 'detailed enough' to escape costing 
By Allie Coyne | Aug 16, 2013 | Comment Now 
Sees no value-add from independent financial analysis.
 
Update: The True Cost of BYOD  
By Brett Winterford | Jul 17, 2013 | Comment Now 
[Blog post] Presentation to the Brisbane 'Touch Tomorrow' event.
 
Infosec mergers and aquisitions: There's really no bubble 
By Nick Ellsmore | Jul 15, 2013 | Comment Now 
Cyber security businesses paying a premium.
 
Simplified attacks can reveal attacker's ID 
 
NBN Co could miss revised June fibre targets 
By Ry Crozier | Jun 19, 2013 | Comment Now 
Analysis: Cutting it fine in the race to the line.
 
John The Ripper cracks Siemens PLC passwords 
May 14, 2013 | Comment Now 
Tool gets a facelift.
 
NBN Co plays election catch-up 
By Ry Crozier | May 6, 2013 | Comment Now 
Analysis: Anatomy of a delay.
 
Aussie software ferrets out hidden money 
By Juha Saarinen | Apr 5, 2013 | Comment Now 
The world's richest named and shamed in tax haven data dump.
 
By Liz Tay | Mar 6, 2013 | Comment Now 
To standardise on regional core platform.
 
CommBank shares IT security models with bank rivals 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Builds security fault tree after RSA breach.
 
CommBank builds security fault tree after RSA breach 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Shares defensive security models with rival Big Four, industry players.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
Feds tip ACTA analysis by year end 
By Ry Crozier | Nov 29, 2012 | Comment Now 
Will they wait for copyright inquiry to conclude?
 
Plunder downunder: How to read the iiTrial piracy verdict 
By Ry Crozier | Apr 24, 2012 | Comment Now 
Five legal experts shake down three years of lawsuits.
 
A new theory of digital identity 
By Stephen Wilson | Mar 14, 2012 | Comment Now 
The final instalment of a two-part feature series explores the troubled practice of federated identity.
 
IBM targets financial firms with commercial Watson 
By Liz Tay | Mar 8, 2012 | Comment Now 
Jeopardy-winning platform offered as cloud-based service.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 619

Vote