IT security: a top five priority for the CIO 
By David Gee | 19 hours ago | Comment Now 
How do you manage security programs without a CSO?
 
Wordpress resets logins after Gmail credentials leak 
By Juha Saarinen | Sep 14, 2014 | Comment Now 
600,000 Wordpress accounts found in dump.
 
Researcher uncovers timing attack to decloak Google users 
By Juha Saarinen | Sep 12, 2014 | Comment Now 
But web giant isn't interested in remediating it.
 
Millions of Gmail user credentials posted on web 
By Juha Saarinen | Sep 11, 2014 | Comment Now 
Passwords may be from more than one source.
 
Why wait for next generation wi-fi? 
By Stuart Corner | Sep 10, 2014 | Comment Now 
Schools and universities split on when to upgrade.
 
Hacking scandal threatens to upend NZ election 
By Juha Saarinen | Sep 2, 2014 | Comment Now 
[Blog post] Rawshark keeps country on edge.
 
Google chairman says 'unbreakable' encryption will become a reality 
 
IT chief brings lessons from Qld's payroll pain to NSW 
By Paris Cowan | Aug 28, 2014 | Comment Now 
NSW Health CIO makes his first address to industry.
 
Melbourne mall uses iBeacon to promote shopping offers 
By Penny Wolf | Aug 13, 2014 | Comment Now 
Shoppers delivered promotions to mobile device.
 
Privacy Commissioner details 'reasonable steps' for data security 
By Paris Cowan | Aug 7, 2014 | Comment Now 
How to stay on the right side of the Privacy Act.
 
Fund managers revisit systems for SuperStream compliance 
By Penny Wolf | Jul 30, 2014 | Comment Now 
ATO data standard represents backward step for some.
 
SA ICT board dodges review 
By Paris Cowan | Jul 9, 2014 | Comment Now 
Updated: Not part of Jay Weatherill reforms.
 
Telstra picks Adelaide for first wi-fi network hotspot 
By Allie Coyne | Jul 8, 2014 | Comment Now 
Prepares pre-Christmas construction.
 
Your Say: Setting the agenda for the State of IT 
By Paris Cowan | Jul 4, 2014 | Comment Now 
[Blog post] We have judged governments across the country, now you judge us.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
Your Say: NSW responds to IT skeptics 
By Paris Cowan | Jun 30, 2014 | Comment Now 
[Blog Post] Insiders cast doubt on the state's veneer of success.
 
Your say: Were we too harsh on SA Govt IT? 
By Paris Cowan | Jun 25, 2014 | Comment Now 
[Blog post] Government CIO responds to State of IT report.
 
Adelaide switches on free outdoor wi-fi 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Internode network nears full completion.
 
Can Victoria put IT failure behind it and modernise? 
By Paris Cowan | Jun 19, 2014 | Comment Now 
[Blog Post] Why the southern state needs to avoid a CenITex brain-drain.
 
Why WA is Australia's least mature government IT shop 
By Paris Cowan | Jun 19, 2014 | Comment Now 
Too harsh? We don't think so.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1376

Vote