Supercomputers to power $5.4m oil exploration project 
By Penny Wolf | Jun 13, 2014 | Comment Now 
Australia's universities hired by energy giants.
 
Citi chases high-flying customers with global banking platform 
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Big business culture leading to big data failure 
By Tiberio Caetano | Mar 28, 2014 | Comment Now 
Cultural, operational shift required.
 
NBN Co turns corner in SA fibre rollout 
By Ry Crozier | Jan 16, 2014 | Comment Now 
Erases memory of delays.
 
Turnbull's NBN policy 'detailed enough' to escape costing 
By Allie Coyne | Aug 16, 2013 | Comment Now 
Sees no value-add from independent financial analysis.
 
Update: The True Cost of BYOD  
By Brett Winterford | Jul 17, 2013 | Comment Now 
[Blog post] Presentation to the Brisbane 'Touch Tomorrow' event.
 
Infosec mergers and aquisitions: There's really no bubble 
By Nick Ellsmore | Jul 15, 2013 | Comment Now 
Cyber security businesses paying a premium.
 
Simplified attacks can reveal attacker's ID 
 
NBN Co could miss revised June fibre targets 
By Ry Crozier | Jun 19, 2013 | Comment Now 
Analysis: Cutting it fine in the race to the line.
 
NBN Co plays election catch-up 
By Ry Crozier | May 6, 2013 | Comment Now 
Analysis: Anatomy of a delay.
 
Aussie software ferrets out hidden money 
By Juha Saarinen | Apr 5, 2013 | Comment Now 
The world's richest named and shamed in tax haven data dump.
 
By Liz Tay | Mar 6, 2013 | Comment Now 
To standardise on regional core platform.
 
CommBank shares IT security models with bank rivals 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Builds security fault tree after RSA breach.
 
CommBank builds security fault tree after RSA breach 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Shares defensive security models with rival Big Four, industry players.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
Feds tip ACTA analysis by year end 
By Ry Crozier | Nov 29, 2012 | Comment Now 
Will they wait for copyright inquiry to conclude?
 
Plunder downunder: How to read the iiTrial piracy verdict 
By Ry Crozier | Apr 24, 2012 | Comment Now 
Five legal experts shake down three years of lawsuits.
 
Adobe drops IE6 Flash support 
By Liam Tung | Mar 29, 2012 | Comment Now 
And fires massive attack on Flash zero days.
 
A new theory of digital identity 
By Stephen Wilson | Mar 14, 2012 | Comment Now 
The final instalment of a two-part feature series explores the troubled practice of federated identity.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1064

Vote