Qld Justice to equip workplace inspectors with Windows tablets 
 
Azure users hit by worldwide outage 
By Allie Coyne | 1 day 14 hours ago | Comment Now 
Microsoft struggles to bring ten services online.
 
Microsoft yanks blue screen of death Windows patch 
By Juha Saarinen | 2 days ago | Comment Now 
Tells customers to uninstall updates.
 
Apple onshores China customers’ personal data 
3 days ago | Comment Now 
Denies risk to user’s privacy.
 
DiData eyes Oakton in landmark deal 
By Steven Kiernan, William Maher | Aug 12, 2014 | Comment Now 
Transaction valued at $171 million.
 
Telstra buys Silicon Valley video streaming company Ooyala 
By Allie Coyne | Aug 12, 2014 | Comment Now 
Gets full ownership for $357 million.
 
Call for papers: Australian Data Centre Strategy Summit 
By Brett Winterford | Aug 8, 2014 | Comment Now 
[Blog post] Announcing our key themes for 2015.
 
ABS finds $57m for big-ticket tech projects 
 
Qld Govt launches cloud infrastructure panel 
By Paris Cowan | Aug 7, 2014 | Comment Now 
First three suppliers signed up by the ‘cloud-first’ state.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Federal Govt unveils cloud services panel terms 
By Paris Cowan | Aug 5, 2014 | Comment Now 
But cloud market is not mature enough to make it mandatory.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
How Service NSW uses data to create ‘healthy competition’ 
By Paris Cowan | Jul 31, 2014 | Comment Now 
Real-time performance dashboards critical to constant improvement.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
Koler ransomware hit Australia hard 
By Juha Saarinen | Jul 29, 2014 | Comment Now 
Depicts fake threats from Australian law enforcement.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  12%
TOTAL VOTES: 412

Vote