Origin Energy completes troubled SAP transformation 
By Allie Coyne | 13 hours ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
NSW FACS to move its SAP back office into the cloud 
By Penny Wolf | Sep 11, 2014 | Comment Now 
CIO Tim Hume prepares for community sector reform.
 
Go fast enough, and you won’t feel the shakes 
By Brett Winterford | Sep 4, 2014 | Comment Now 
After a decade of trying to ignore the turbulence, News Corp has tied its future to the cloud.
 
Microsoft defies order to hand over user emails 
Sep 1, 2014 | Comment Now 
US judge unfreezes search warrant.
 
Photos: SAP drops $60m on Victorian support facility 
By Penny Wolf | Aug 29, 2014 | Comment Now 
Innovation and support centre promises 120 ICT jobs.
 
Qld Health trials self-service kiosks for payroll 
By Allie Coyne | Aug 28, 2014 | Comment Now 
Help for 60 percent of staff without a PC.
 
IBM launches SoftLayer cloud in Melbourne, Sydney 
By Penny Wolf | Aug 26, 2014 | Comment Now 
Melbourne live next month, Sydney to follow.
 
Is public cloud ready for your critical business applications? 
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
Infor has Salesforce in its sights with latest acquisition 
By Penny Wolf | Aug 15, 2014 | Comment Now 
Saleslogix purchase rounds out CRM footprint.
 
How Hyundai freed its workforce from the office 
By Penny Wolf | Aug 4, 2014 | Comment Now 
BI delivered to any device.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Westpac committed to core banking plan 
By Brett Winterford, Allie Coyne | Aug 1, 2014 | Comment Now 
[Blog post] Now with leadership.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
 
Potential backdoors in US crypto standards discovered 
By Stacy Cowley | Jul 15, 2014 | Comment Now 
NIST-commissioned report released.
 
Oracle preps critical security update 
By Juha Saarinen | Jul 15, 2014 | Comment Now 
All Java vulnerabilities remotely exploitable.
 
Sydney Trains brings train data into the digital era 
By Allie Coyne | Jul 14, 2014 | Comment Now 
Aims to deliver travellers better information.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1043

Vote