Origin Energy completes troubled SAP transformation 
By Allie Coyne | 2 days ago | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Chinese hacked US military contractors 
2 days ago | Comment Now 
Senate panel releases report.
 
Govts pressure Google for more user data 
By Allie Coyne | 4 days ago | Comment Now 
Australian requests dip slightly.
 
Tracking the year of CIO churn 
By Brett Winterford, Penny Wolf | Sep 11, 2014 | Comment Now 
[Blog post] Who shone through in 12 months of disruption?
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Building a rapid response team 
By Brett Winterford | Aug 25, 2014 | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
The [digital] natives are restless 
By Vito Forte | Aug 22, 2014 | Comment Now 
[Blog post] And not interested in what you and I call a 'career'.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | Aug 21, 2014 | Comment Now 
MD says there are bigger problems to solve.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
Uncapped fees to drive digital agenda at universities 
By Brett Winterford | Jul 28, 2014 | Comment Now 
University CIOs look to provide the 'wow' factor.
 
Vatican entangled in HP, Autonomy stoush 
Jul 21, 2014 | Comment Now 
Dispute sheds light on HP case in troubled deal.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
Digital Post shuts down 
By Allie Coyne, Paris Cowan | Jun 18, 2014 | Comment Now 
[Updated] Not enough customers.
 
The State of IT 
Jun 13, 2014 | Comment Now 
Ranking the best and the worst of IT in Australia's states and territories.
 
One login, one password, one huge data breach 
By Juha Saarinen | May 28, 2014 | Comment Now 
[Blog post] Transparency for myGov security, please.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1066

Vote