Tags: cscRemove, isoftRemove, regulatorRemove

Westpac committed to core banking plan 
By Brett Winterford, Allie Coyne | Aug 1, 2014 | Comment Now 
[Blog post] Now with leadership.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
Photos: CSC launches Sydney Security Operations Centre 
 
Westpac ramps up online banking migrations 
By Allie Coyne | May 6, 2014 | Comment Now 
Around 200k users shifted over six months.
 
US telco regulator to write new open internet rules 
 
MacTel tops political IT donors list 
By Paris Cowan | Feb 3, 2014 | Comment Now 
Annual returns published.
 
AMP introduces competition to CSC outsourcing deal 
By Brett Winterford | Oct 30, 2013 | Comment Now 
Carefully considered cloud model aims to keep the peace.
 
Rio Tinto to outsource IT 'back office' to IBM 
By Ry Crozier | Oct 22, 2013 | Comment Now 
Cost reduction exercise.
 
Microsoft urged to put Ford, CSC bosses on CEO shortlist 
 
US regulators meet Bitcoin advocates 
 
Telstra faces objection over .yellowpages domain 
By Charis Palmer | Mar 27, 2013 | Comment Now 
ICANN to respond in mid-April.
 
Melbourne IT sells digital division 
By Allie Coyne | Mar 12, 2013 | Comment Now 
Returns to roots as hosting business.
 
Australia's miners, gas operators drive towards digital radio 
 
US regulators expected to wrap up Google probe 
 
CSC sells Aussie IT recruitment business 
By Allie Coyne | Dec 13, 2012 | Comment Now 
South African firm buys Paxus division.
 
Digital Realty, Westpac detail data centre strategy 
By Brett Winterford | Dec 3, 2012 | Comment Now 
Second round speakers announced for iTnews conference.
 
CSC to set up Wollongong cybersecurity centre 
By Ry Crozier | Nov 13, 2012 | Comment Now 
Attracts $2.76m co-investment.
 
CSC to set up Wollongong cybersecurity centre 
By Ry Crozier | Nov 12, 2012 | Comment Now 
Attracts $2.76m co-investment.
 
ACCC to decommission Adelaide data centre 
By Ry Crozier | Oct 19, 2012 | Comment Now 
Reveals project to bring secure data to iOS devices.
 
Court rejects ex-iSoft CTO claims 
By James Hutchinson | Oct 3, 2012 | Comment Now 
Contract offers no basis for breach claims.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 584

Vote