Microsoft crowns Azure ready for Aus govt workloads 
By Brett Winterford | Oct 7, 2014 | Comment Now 
Ticks off a few compliance items prior to launch.
 
IT security: a top five priority for the CIO 
By David Gee | Oct 1, 2014 | Comment Now 
[Blog Post] How do you manage security programs without a CSO?
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Turnbull audit finds Labor's NBN 'rushed, chaotic' 
By Allie Coyne | Aug 5, 2014 | Comment Now 
Opposition hits back at reviews 'written by mates'.
 
Fund managers revisit systems for SuperStream compliance 
By Penny Wolf | Jul 30, 2014 | Comment Now 
ATO data standard represents backward step for some.
 
Auditor puts big IT projects on notice 
By Paris Cowan | Jul 3, 2014 | Comment Now 
Telco interception, DHS outsourcing on the watchlist.
 
Commission of Audit recommends IT outsourcing agenda 
Promotes digital, cloud-first approach to whole-of-government IT.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Target lawsuit a ‘call to action’ for PCI DSS compliance 
By Munir Kotadia | Mar 28, 2014 | Comment Now 
Make the effort more than once a year.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Australia faces lawsuits over asylum seeker data breach 
By Allie Coyne | Mar 10, 2014 | Comment Now 
Immigration Minister still holds power in protection decision.
 
Turnbull to audit the conception of Labor's NBN 
By Allie Coyne | Mar 7, 2014 | Comment Now 
Former Telstra exec to lead sixth inquiry into NBN.
 
Weather bureau forced to dump water data project 
By John Hilvert | Feb 7, 2014 | Comment Now 
Audit questions $38 million bill for open source project.
 
Are you ready for a data request deluge? 
By Brett Winterford | Jan 16, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 4.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  11%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 288

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  60%
 
No
  40%
TOTAL VOTES: 106

Vote