Tags: digitalRemove, reportRemove

Tracking the year of CIO churn 
By Brett Winterford, Penny Wolf | Sep 11, 2014 | Comment Now 
[Blog post] Who shone through in 12 months of disruption?
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Building a rapid response team 
By Brett Winterford | Aug 25, 2014 | Comment Now 
Don't panic about digital disruption, says Fairfax CIO Andrew Lam-Po-Tang: just be sure the gun is loaded and ready to fire.
 
The [digital] natives are restless 
By Vito Forte | Aug 22, 2014 | Comment Now 
[Blog post] And not interested in what you and I call a 'career'.
 
Google Australia MD rules out local Wallet 
By Penny Wolf | Aug 21, 2014 | Comment Now 
MD says there are bigger problems to solve.
 
Uncapped fees to drive digital agenda at universities 
By Brett Winterford | Jul 28, 2014 | Comment Now 
University CIOs look to provide the 'wow' factor.
 
Vatican entangled in HP, Autonomy stoush 
Jul 21, 2014 | Comment Now 
Dispute sheds light on HP case in troubled deal.
 
Digital Post shuts down 
By Allie Coyne, Paris Cowan | Jun 18, 2014 | Comment Now 
[Updated] Not enough customers.
 
ANZ begins to reap results from tech transformation 
By Allie Coyne | May 1, 2014 | Comment Now 
iPads, smart ATMs, mobile apps help reduce customer complaints.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
NSW Police to pilot first-stop data drop box 
By Allie Coyne | Feb 20, 2014 | Comment Now 
Email, shared drives not appropriate.
 
Councils speak out as NBN plans unravel 
By Ry Crozier | Feb 3, 2014 | Comment Now 
Shared IT, digital visions fall apart.
 
Billabong to leverage IT to recover from $860m loss 
By Allie Coyne | Dec 10, 2013 | Comment Now 
Outlines seven steps to get brands back on track.
 
Coffs Harbour residents test NBN's impact 
By Ry Crozier | Dec 9, 2013 | Comment Now 
Join Brunswick as case study for high-speed internet use.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1118

Vote