ATO releases long-awaited Bitcoin guidance 
By Paris Cowan | Aug 20, 2014 | Comment Now 
Everyday investors escape the tax man.
 
Auditor puts big IT projects on notice 
By Paris Cowan | Jul 3, 2014 | Comment Now 
Telco interception, DHS outsourcing on the watchlist.
 
Commonwealth IT systems vulnerable to external attack 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Agencies complain of resource constraints.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Dodo caught out for failing to send usage alerts 
By Paris Cowan | Jun 18, 2014 | Comment Now 
Telco compensates customers.
 
NSW Police Minister considers proposal to license IT security providers 
By Allie Coyne | Jun 18, 2014 | Comment Now 
Updated: Infosec professionals unimpressed.
 
ACS rejects AIIA's 'Australia tax' justification 
 
This is what digital disruption looks like 
By Brett Winterford | Jun 17, 2014 | Comment Now 
[Blog post]: Disrupting the undisruptable.
 
Govt advisors recommend crowdfunding regulation 
By Paris Cowan | Jun 6, 2014 | Comment Now 
Injecting confidence into the start-up scene.
 
Banks call for end to regulatory burden on technology 
 
Should social media be regulated during election campaigns? 
By Paris Cowan | Apr 4, 2014 | Comment Now 
Victorian Parliament to investigate accountability on the web.
 
ACCC waters down Telstra exchange price threat 
Mar 31, 2014 | Comment Now 
Still on legal collision course?
 
ANAO rolls out BlackBerry's multi-OS MDM 
By John Hilvert | Mar 11, 2014 | Comment Now 
Price cuts sweetened the ANAO deal.
 
Telstra, VHA under pressure from messaging apps 
Feb 21, 2014 | Comment Now 
Are SMS prices low enough to keep regulators at bay?
 
Weather bureau forced to dump water data project 
By John Hilvert | Feb 7, 2014 | Comment Now 
Audit questions $38 million bill for open source project.
 
Half of users abandon smart meter trial  
By Andrew Colley | Jan 30, 2014 | Comment Now 
Audit questions price tag for under-subscribed retail program.
 
Government takes on web giants over 'harmful' content 
By Paris Cowan | Jan 22, 2014 | Comment Now 
But will it be a toothless tiger?
 
The Privacy Act and the cloud 
By Brett Winterford | Jan 14, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 2.
 
Chorus price cut casts shadow over Ultra-Fast Broadband 
By Juha Saarinen | Nov 5, 2013 | Comment Now 
Government caught in the middle.
 
Audit Office to replace PeopleSoft with hosted HR system 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 567

Vote