Privacy law: Making it stick 
By Brett Winterford | 3 days ago | Comment Now 
Q&A with Australia's Privacy Commissioner, Timothy Pilgrim.
 
Microsoft crowns Azure ready for Aus govt workloads 
By Brett Winterford | Oct 7, 2014 | Comment Now 
Ticks off a few compliance items prior to launch.
 
Optus to outsource, offshore 75 jobs 
By Allie Coyne | Oct 3, 2014 | Comment Now 
Ongoing transformation efforts affect digital division.
 
IT security: a top five priority for the CIO 
By David Gee | Oct 1, 2014 | Comment Now 
[Blog Post] How do you manage security programs without a CSO?
 
ALRC drops safe harbour from proposed privacy law 
By Paris Cowan | Sep 3, 2014 | Comment Now 
Online intermediaries encouraged to act against breaches.
 
SA Health confirms legal spat with Allscripts 
By Paris Cowan | Aug 20, 2014 | Comment Now 
Claim and counter-claim over EPAS billing module delays.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
Fund managers revisit systems for SuperStream compliance 
By Penny Wolf | Jul 30, 2014 | Comment Now 
ATO data standard represents backward step for some.
 
Tough NZ comms interception, network security law kicks in 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aussie operators in NZ must register with police.
 
Oracle wins against Google in Java copyright case 
By Dan Levine, Diane Bartz | May 11, 2014 | Comment Now 
Decision "will definitely shake up software industry".
 
Target lawsuit a ‘call to action’ for PCI DSS compliance 
By Munir Kotadia | Mar 28, 2014 | Comment Now 
Make the effort more than once a year.
 
Kim Dotcom raid ruled legal 
By Naomi Tajitsu | Feb 19, 2014 | Comment Now 
Could make way for US extradition.
 
Software piracy hunters target cloud users 
By Juha Saarinen | Jan 30, 2014 | Comment Now 
As traditional avenues for IP violations dry up.
 
HP mulls legal action on Autonomy fraud claims 
 
Are you ready for a data request deluge? 
By Brett Winterford | Jan 16, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 4.
 
Defence mulls surveillance malware export restrictions 
By Darren Pauli | Jan 15, 2014 | Comment Now 
Govts clamp down on zero day exploit trading.
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
FBI puts bounty on last alleged 'Ghost Click' conspirator 
By Darren Pauli | Nov 6, 2013 | Comment Now 
Five targets named in global cybercrime hunt.
 
FBI adds bounties to five alleged crackers, fraudsters and phreaks 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 339

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote