BugHerd splits into three with investment 
By Penny Wolf | Aug 25, 2014 | Comment Now 
$1m funding to develop agency play.
 
Sydney Trains signs $35m outsourcing deal with HCL 
By Allie Coyne | Aug 14, 2014 | Comment Now 
Application support and maintenance.
 
How to hire top talent 
By Ajay Bhatia | Jun 4, 2014 | Comment Now 
[Blog entry] Carsales CIO says bias will get you nowhere.
 
ING moves to next stage of IT overhaul 
By Allie Coyne | May 8, 2014 | Comment Now 
No rest after ticking off ‘Zero Touch IT’.
 
Facebook introduces API stability, privacy enhancements 
By Juha Saarinen | May 1, 2014 | Comment Now 
Mobile takes centre stage at developer conference.
 
Panasonic, Fujitsu to form new chip design company 
 
Microsoft strengthens .NET open source credentials 
 
Microsoft to bring back Start menu, boot to desktop 
 
NSW Police to overhaul FOI system 
By Allie Coyne | Mar 11, 2014 | Comment Now 
Long-awaited replacement to paper-based interim solution.
 
Making software development contracts Agile 
By Buddle Findlay | Feb 28, 2014 | Comment Now 
Agile projects can provide more risk than traditional ones if not managed properly.
 
Google's new Android focuses on performance improvements 
 
Next version of hyper text protocol to be binary 
By Juha Saarinen | Jul 10, 2013 | Comment Now 
Lower perception of webpage delay.
 
Google reverses calendar API decision 
By Juha Saarinen | Jun 6, 2013 | Comment Now 
Makes CardDAV public too.
 
ATO commits to complexity 
By Liz Tay | May 24, 2013 | Comment Now 
Greater demand, fewer apps.
 
Google I/O tells strategy story 
By David Glance | May 17, 2013 | Comment Now 
Gives hints as to where it will compete.
 
Kim Dotcom's Mega working on encrypted email 
By Charis Palmer | May 9, 2013 | Comment Now 
Promises 'pants' for 'naked' users.
 
Kim Dotcom's Mega working on encrypted email 
By Charis Palmer | May 8, 2013 | Comment Now 
Promises 'pants' for 'naked' users.
 
By Liz Tay | Apr 2, 2013 | Comment Now 
Adopts CommBank tool in push towards continuous delivery.
 
Poor countries suffer more from malware: report 
By Joshua Gliddon | Feb 8, 2013 | Comment Now 
Membership of security groups indicates good cybersecurity performance.
 
Telstra tests P2P traffic inspection on Victorian internet users 
By Ry Crozier | Feb 5, 2013 | Comment Now 
Small number of customers participate in opt-out trial.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1349

Vote