Azure users hit by worldwide outage 
By Allie Coyne | 2 days ago | Comment Now 
Microsoft struggles to bring ten services online.
 
Apple onshores China customers’ personal data 
3 days ago | Comment Now 
Denies risk to user’s privacy.
 
DiData eyes Oakton in landmark deal 
By Steven Kiernan, William Maher | Aug 12, 2014 | Comment Now 
Transaction valued at $171 million.
 
Call for papers: Australian Data Centre Strategy Summit 
By Brett Winterford | Aug 8, 2014 | Comment Now 
[Blog post] Announcing our key themes for 2015.
 
ABS finds $57m for big-ticket tech projects 
 
Qld Govt launches cloud infrastructure panel 
By Paris Cowan | Aug 7, 2014 | Comment Now 
First three suppliers signed up by the ‘cloud-first’ state.
 
Wikipedia publishes EU take-down notices 
By Julia Fioretti | Aug 7, 2014 | Comment Now 
Fights against "internet riddled with memory holes".
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Thousands of patient files held to ransom in Hong Kong 
 
Brandis reveals websites will be included in data retention 
By Allie Coyne | Aug 6, 2014 | Comment Now 
Adds to confusion around definition of metadata.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
FBI used malware in criminal investigation 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Court documents reveal "Network Investigation Tool".
 
Federal Govt unveils cloud services panel terms 
By Paris Cowan | Aug 5, 2014 | Comment Now 
But cloud market is not mature enough to make it mandatory.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
How Hyundai freed its workforce from the office 
By Penny Wolf | Aug 4, 2014 | Comment Now 
BI delivered to any device.
 
Microsoft ordered to provide foreign customer information 
Aug 1, 2014 | Comment Now 
Throws EU privacy laws to the wind.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
How Service NSW uses data to create ‘healthy competition’ 
By Paris Cowan | Jul 31, 2014 | Comment Now 
Real-time performance dashboards critical to constant improvement.
 
A ten-point plan for disrupting security 
By Vito Forte | Jul 29, 2014 | Comment Now 
[Blog post] How can you defend the perimeter when it’s in the cloud?
 
ABC to make the switch to cloud email 
By Paris Cowan | Jul 29, 2014 | Comment Now 
As budget pressures descend.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 419

Vote