Tags: analysisRemove, prevxRemove, utmRemove

Supercomputers to power $5.4m oil exploration project 
By Penny Wolf | Jun 13, 2014 | Comment Now 
Australia's universities hired by energy giants.
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Big business culture leading to big data failure 
By Tiberio Caetano | Mar 28, 2014 | Comment Now 
Cultural, operational shift required.
 
Turnbull's NBN policy 'detailed enough' to escape costing 
By Allie Coyne | Aug 16, 2013 | Comment Now 
Sees no value-add from independent financial analysis.
 
Update: The True Cost of BYOD  
By Brett Winterford | Jul 17, 2013 | Comment Now 
[Blog post] Presentation to the Brisbane 'Touch Tomorrow' event.
 
Infosec mergers and aquisitions: There's really no bubble 
By Nick Ellsmore | Jul 15, 2013 | Comment Now 
Cyber security businesses paying a premium.
 
Simplified attacks can reveal attacker's ID 
 
NBN Co could miss revised June fibre targets 
By Ry Crozier | Jun 19, 2013 | Comment Now 
Analysis: Cutting it fine in the race to the line.
 
NBN Co plays election catch-up 
By Ry Crozier | May 6, 2013 | Comment Now 
Analysis: Anatomy of a delay.
 
Aussie software ferrets out hidden money 
By Juha Saarinen | Apr 5, 2013 | Comment Now 
The world's richest named and shamed in tax haven data dump.
 
CommBank shares IT security models with bank rivals 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Builds security fault tree after RSA breach.
 
CommBank builds security fault tree after RSA breach 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Shares defensive security models with rival Big Four, industry players.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
Feds tip ACTA analysis by year end 
By Ry Crozier | Nov 29, 2012 | Comment Now 
Will they wait for copyright inquiry to conclude?
 
Researcher pokes holes through Fortinet UTM 
By Darren Pauli | Sep 20, 2012 | Comment Now 
God boxes open to session jacking, code execution.
 
Sophos launches new UTM 
By SC Staff | Jul 17, 2012 | Comment Now 
Uses Astaro technology.
 
Cyberoam generates fix for 'nullified' vulnerability 
By Darren Pauli | Jul 11, 2012 | Comment Now 
Generates unique certificates.
 
Cyberoam: "Not a mass surveillance device" 
By Darren Pauli | Jul 9, 2012 | Comment Now 
Company refutes TorProject claims private keys can be extracted.
 
Plunder downunder: How to read the iiTrial piracy verdict 
By Ry Crozier | Apr 24, 2012 | Comment Now 
Five legal experts shake down three years of lawsuits.
 
A new theory of digital identity 
By Stephen Wilson | Mar 14, 2012 | Comment Now 
The final instalment of a two-part feature series explores the troubled practice of federated identity.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 243

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 78

Vote