UPS reveals data breach across 51 US stores 
20 hours ago | Comment Now 
User details compromised.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger' 
By Allie Coyne | 3 days ago | Comment Now 
IT transformation starts to reap results.
 
Azure users hit by worldwide outage 
By Allie Coyne | 3 days ago | Comment Now 
Microsoft struggles to bring ten services online.
 
Apple onshores China customers’ personal data 
5 days ago | Comment Now 
Denies risk to user’s privacy.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Apple readies HealthKit rollout amid tangled regulatory web 
Aug 12, 2014 | Comment Now 
In discussions with health providers.
 
DiData eyes Oakton in landmark deal 
By Steven Kiernan, William Maher | Aug 12, 2014 | Comment Now 
Transaction valued at $171 million.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt FinFisher spyware exposed after data breach 
 
Call for papers: Australian Data Centre Strategy Summit 
By Brett Winterford | Aug 8, 2014 | Comment Now 
[Blog post] Announcing our key themes for 2015.
 
AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Turnbull offers metadata definition 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Doesn't include websites.
 
ABS finds $57m for big-ticket tech projects 
 
Qld Govt launches cloud infrastructure panel 
By Paris Cowan | Aug 7, 2014 | Comment Now 
First three suppliers signed up by the ‘cloud-first’ state.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
Federal Govt unveils cloud services panel terms 
By Paris Cowan | Aug 5, 2014 | Comment Now 
But cloud market is not mature enough to make it mandatory.
 
How Hyundai freed its workforce from the office 
By Penny Wolf | Aug 4, 2014 | Comment Now 
BI delivered to any device.
 
How Service NSW uses data to create ‘healthy competition’ 
By Paris Cowan | Jul 31, 2014 | Comment Now 
Real-time performance dashboards critical to constant improvement.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 481

Vote