Azure users hit by worldwide outage 
By Allie Coyne | 3 days ago | Comment Now 
Microsoft struggles to bring ten services online.
 
Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
DiData eyes Oakton in landmark deal 
By Steven Kiernan, William Maher | Aug 12, 2014 | Comment Now 
Transaction valued at $171 million.
 
Telstra buys Silicon Valley video streaming company Ooyala 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Gets full ownership for $357 million.
 
Call for papers: Australian Data Centre Strategy Summit 
By Brett Winterford | Aug 8, 2014 | Comment Now 
[Blog post] Announcing our key themes for 2015.
 
Qld Govt launches cloud infrastructure panel 
By Paris Cowan | Aug 7, 2014 | Comment Now 
First three suppliers signed up by the ‘cloud-first’ state.
 
Apple, Samsung end Australian patent battle 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Fight rages on in the United States.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Federal Govt unveils cloud services panel terms 
By Paris Cowan | Aug 5, 2014 | Comment Now 
But cloud market is not mature enough to make it mandatory.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
How Service NSW uses data to create ‘healthy competition’ 
By Paris Cowan | Jul 31, 2014 | Comment Now 
Real-time performance dashboards critical to constant improvement.
 
BlackBerry to acquire German firm Secusmart 
Jul 30, 2014 | Comment Now 
Improves security credentials with deal.
 
Apple updates retina MacBook Pro range 
By Juha Saarinen | Jul 30, 2014 | Comment Now 
More memory, faster processors, reduced price on high-end model.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
ABC to make the switch to cloud email 
By Paris Cowan | Jul 29, 2014 | Comment Now 
As budget pressures descend.
 
Have you fallen for the big data trap? 
By Vito Forte | Jul 28, 2014 | Comment Now 
[Blog post] Big data IS the problem.
 
South Australia promises imminent cloud policy 
By Paris Cowan | Jul 25, 2014 | Comment Now 
Agencies demand more guidance.
 
Apple iOS backdoors are 'diagnostic capabilities' 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Functions help IT departments and devs, Apple says.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 472

Vote