Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | 1 hour ago | Comment Now 
Commercial motives behind the data theft.
 
Dropbox cuts cloud storage prices to match Google 
 
Will Nutanix be outflanked before reaching IPO? 
By Justin Warren | 6 days ago | Comment Now 
VMware muscles in on storage startup in hyper-converged infrastructure.
 
Cisco restructuring to cost $751 million 
Aug 15, 2014 | Comment Now 
Up to $375 million to be recognised in the first quarter.
 
Cisco to cut 6000 jobs as sales decline 
Aug 14, 2014 | Comment Now 
Third round of layoffs in as many years.
 
Global internet outages caused by routing table spike 
By Juha Saarinen | Aug 14, 2014 | Comment Now 
Network routers hit capacity limits.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Customs to pilot new border clearance system 
By Allie Coyne | Jul 21, 2014 | Comment Now 
Automated, biometric future for travellers.
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
Westpac swaps Blackberry for Android 
By Brett Winterford | Jun 27, 2014 | Comment Now 
Bank arms staff with tech arsenal.
 
Google gives businesses unlimited cloud storage 
By Juha Saarinen | Jun 26, 2014 | Comment Now 
Claims 190 million users.
 
Swinburne downs systems for major kit upgrade 
By Allie Coyne | Jun 24, 2014 | Comment Now 
Replaces network, identity management; plots cloud.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
Telstra expands cloud services to US 
By Penny Wolf | Jun 19, 2014 | Comment Now 
Considers hubs in emerging markets.
 
SanDisk to acquire Fusion-io 
Jun 17, 2014 | Comment Now 
Brings over customers like Apple, Facebook.
 
Target US appoints a CISO 
By Allie Coyne | Jun 12, 2014 | Comment Now 
Lures General Motors security boss in response to data breach.
 
NSW Police CIO prepares for copper-cam data deluge 
By Paris Cowan | Jun 2, 2014 | Comment Now 
Could produce a petabyte of data every year.
 
Spooks are not compatible with IT security 
By Juha Saarinen | May 20, 2014 | Comment Now 
[Blog post] Trust is gone.
 
Cisco's Chambers urges Obama to curb NSA surveillance  
 
General Electric picks Box for enterprise content sharing 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 768

Vote