Privacy law: Making it stick 
By Brett Winterford | 3 days ago | Comment Now 
Q&A with Australia's Privacy Commissioner, Timothy Pilgrim.
 
Microsoft crowns Azure ready for Aus govt workloads 
By Brett Winterford | Oct 7, 2014 | Comment Now 
Ticks off a few compliance items prior to launch.
 
IT security: a top five priority for the CIO 
By David Gee | Oct 1, 2014 | Comment Now 
[Blog Post] How do you manage security programs without a CSO?
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Turnbull audit finds Labor's NBN 'rushed, chaotic' 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Opposition hits back at reviews 'written by mates'.
 
Fund managers revisit systems for SuperStream compliance 
By Penny Wolf | Jul 30, 2014 | Comment Now 
ATO data standard represents backward step for some.
 
Auditor puts big IT projects on notice 
By Paris Cowan | Jul 3, 2014 | Comment Now 
Telco interception, DHS outsourcing on the watchlist.
 
Commission of Audit recommends IT outsourcing agenda 
Promotes digital, cloud-first approach to whole-of-government IT.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Target lawsuit a ‘call to action’ for PCI DSS compliance 
By Munir Kotadia | Mar 28, 2014 | Comment Now 
Make the effort more than once a year.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Australia faces lawsuits over asylum seeker data breach 
By Allie Coyne | Mar 10, 2014 | Comment Now 
Immigration Minister still holds power in protection decision.
 
Turnbull to audit the conception of Labor's NBN 
By Allie Coyne | Mar 7, 2014 | Comment Now 
Former Telstra exec to lead sixth inquiry into NBN.
 
Weather bureau forced to dump water data project 
By John Hilvert | Feb 7, 2014 | Comment Now 
Audit questions $38 million bill for open source project.
 
Are you ready for a data request deluge? 
By Brett Winterford | Jan 16, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 4.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 346

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 144

Vote