Supercomputers to power $5.4m oil exploration project 
By Penny Wolf | Jun 13, 2014 | Comment Now 
Australia's universities hired by energy giants.
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Big business culture leading to big data failure 
By Tiberio Caetano | Mar 28, 2014 | Comment Now 
Cultural, operational shift required.
 
Turnbull's NBN policy 'detailed enough' to escape costing 
By Allie Coyne | Aug 16, 2013 | Comment Now 
Sees no value-add from independent financial analysis.
 
Update: The True Cost of BYOD  
By Brett Winterford | Jul 17, 2013 | Comment Now 
[Blog post] Presentation to the Brisbane 'Touch Tomorrow' event.
 
Infosec mergers and aquisitions: There's really no bubble 
By Nick Ellsmore | Jul 15, 2013 | Comment Now 
Cyber security businesses paying a premium.
 
Simplified attacks can reveal attacker's ID 
 
NBN Co could miss revised June fibre targets 
By Ry Crozier | Jun 19, 2013 | Comment Now 
Analysis: Cutting it fine in the race to the line.
 
NBN Co plays election catch-up 
By Ry Crozier | May 6, 2013 | Comment Now 
Analysis: Anatomy of a delay.
 
Aussie software ferrets out hidden money 
By Juha Saarinen | Apr 5, 2013 | Comment Now 
The world's richest named and shamed in tax haven data dump.
 
CommBank shares IT security models with bank rivals 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Builds security fault tree after RSA breach.
 
CommBank builds security fault tree after RSA breach 
By Darren Pauli | Mar 4, 2013 | Comment Now 
Shares defensive security models with rival Big Four, industry players.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
 
Feds tip ACTA analysis by year end 
By Ry Crozier | Nov 29, 2012 | Comment Now 
Will they wait for copyright inquiry to conclude?
 
Plunder downunder: How to read the iiTrial piracy verdict 
By Ry Crozier | Apr 24, 2012 | Comment Now 
Five legal experts shake down three years of lawsuits.
 
A new theory of digital identity 
By Stephen Wilson | Mar 14, 2012 | Comment Now 
The final instalment of a two-part feature series explores the troubled practice of federated identity.
 
Open source Malwr analysis launched 
By Darren Pauli | Jan 25, 2012 | Comment Now 
Project backed by Shadowserver.
 
Analysis: HTML5 security holes detailed 
By Darren Pauli | Jan 4, 2012 | Comment Now 
Security shortfalls in burgeoning standard.
 
Analysis: A history of advanced evasion techniques 
 
A new theory of digital identity 
By Stephen Wilson | Nov 30, 2011 | Comment Now 
Stephen Wilson puts digital identity under the microscope.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  26%
TOTAL VOTES: 247

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 80

Vote