Making a case for collaboration 
By Jeff Jacobs | Sep 18, 2014 | Comment Now 
[Blog post] Tap into your company’s people power.
 
Cisco buys private cloud provider startup Metacloud 
By Juha Saarinen | Sep 18, 2014 | Comment Now 
Acquisition to accelerate Intercloud offering.
 
Hackers break into server for Obamacare website 
 
Microsoft defies order to hand over user emails 
Sep 1, 2014 | Comment Now 
US judge unfreezes search warrant.
 
Will Nutanix be outflanked before reaching IPO? 
By Justin Warren | Aug 27, 2014 | Comment Now 
VMware muscles in on storage startup in hyper-converged infrastructure.
 
Cisco restructuring to cost $751 million 
Aug 15, 2014 | Comment Now 
Up to $375 million to be recognised in the first quarter.
 
Cisco to cut 6000 jobs as sales decline 
Aug 14, 2014 | Comment Now 
Third round of layoffs in as many years.
 
Global internet outages caused by routing table spike 
By Juha Saarinen | Aug 14, 2014 | Comment Now 
Network routers hit capacity limits.
 
Microsoft plugs critical IE vulnerabilities 
By Juha Saarinen | Aug 13, 2014 | Comment Now 
XI = 0 for the first time.
 
ABS finds $57m for big-ticket tech projects 
 
Concealed cyber crime gang uncovered 
Jul 2, 2014 | Comment Now 
Targets lucrative industries, hosted on Dropbox.
 
DFAT upgrades ageing web server for passports system 
By Allie Coyne | Jul 1, 2014 | Comment Now 
Playing catch-up on security.
 
Westpac swaps Blackberry for Android 
By Brett Winterford | Jun 27, 2014 | Comment Now 
Bank arms staff with tech arsenal.
 
Swinburne downs systems for major kit upgrade 
By Allie Coyne | Jun 24, 2014 | Comment Now 
Replaces network, identity management; plots cloud.
 
Telstra expands cloud services to US 
By Penny Wolf | Jun 19, 2014 | Comment Now 
Considers hubs in emerging markets.
 
Target US appoints a CISO 
By Allie Coyne | Jun 12, 2014 | Comment Now 
Lures General Motors security boss in response to data breach.
 
Hewlett-Packard enters the supercomputer game 
By Penny Wolf | Jun 11, 2014 | Comment Now 
Launches water-cooled server.
 
AWS 3D graphics instances come to Sydney 
 
Spooks are not compatible with IT security 
By Juha Saarinen | May 20, 2014 | Comment Now 
[Blog post] Trust is gone.
 
Cisco's Chambers urges Obama to curb NSA surveillance  
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1376

Vote