Qld Justice to equip workplace inspectors with Windows tablets 
 
Azure users hit by worldwide outage 
By Allie Coyne | 4 days ago | Comment Now 
Microsoft struggles to bring ten services online.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | 5 days ago | Comment Now 
Tells customers to uninstall updates.
 
Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
DiData eyes Oakton in landmark deal 
By Steven Kiernan, William Maher | Aug 12, 2014 | Comment Now 
Transaction valued at $171 million.
 
Call for papers: Australian Data Centre Strategy Summit 
By Brett Winterford | Aug 8, 2014 | Comment Now 
[Blog post] Announcing our key themes for 2015.
 
ABS finds $57m for big-ticket tech projects 
 
Qld Govt launches cloud infrastructure panel 
By Paris Cowan | Aug 7, 2014 | Comment Now 
First three suppliers signed up by the ‘cloud-first’ state.
 
Apple, Samsung end Australian patent battle 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Fight rages on in the United States.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Federal Govt unveils cloud services panel terms 
By Paris Cowan | Aug 5, 2014 | Comment Now 
But cloud market is not mature enough to make it mandatory.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
How Service NSW uses data to create ‘healthy competition’ 
By Paris Cowan | Jul 31, 2014 | Comment Now 
Real-time performance dashboards critical to constant improvement.
 
BlackBerry to acquire German firm Secusmart 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | Jul 30, 2014 | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
 
ABC to make the switch to cloud email 
By Paris Cowan | Jul 29, 2014 | Comment Now 
As budget pressures descend.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 487

Vote