Govt offers up draft FTTB wholesale conditions 
By Allie Coyne | 5 days ago | Comment Now 
Rules to counter TPG threat to NBN.
 
Router rooting is shooting fish in a barrel 
By Juha Saarinen | 6 days ago | Comment Now 
[Blog post] Don't rely on broadband or wireless router vendors to protect you.
 
Origin Energy completes troubled SAP transformation 
By Allie Coyne | Sep 18, 2014 | Comment Now 
Claims to have beaten deadline and saved $100 million.
 
Chinese hacked US military contractors 
Sep 18, 2014 | Comment Now 
Senate panel releases report.
 
Victoria Police to get ASIO-like spying powers 
By Allie Coyne, Paris Cowan | Sep 17, 2014 | Comment Now 
But commissioner remains concerned about data security.
 
Govts pressure Google for more user data 
By Allie Coyne | Sep 16, 2014 | Comment Now 
Australian requests dip slightly.
 
Qld Govt applies ICT-as-a-service mandate to 1WS 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Landmark building to be 'a showpiece for the future'.
 
US Govt CTO steps down for Silicon Valley role 
Aug 25, 2014 | Comment Now 
Will help recruit talent into government.
 
Turnbull picks 3.5GHz for metro NBN spectrum gap 
By Allie Coyne | Aug 21, 2014 | Comment Now 
Works to fix 80,000 premises shortfall.
 
Govt to release thousands of data sets to app developers 
By Andrew Colley | Aug 11, 2014 | Comment Now 
An extra 6000 sets of info to go public.
 
Russia wants Apple, SAP source code to check for spying 
Jul 31, 2014 | Comment Now 
To 'ensure privacy rights of users'.
 
Govt must store data in retention regime: iiNet 
By Allie Coyne | Jul 29, 2014 | Comment Now 
Calls for correcting of ‘inaccurate and misleading’ metadata claims.
 
EFF claims NSA 'digital dragnet' unconstitutional 
By Juha Saarinen | Jul 28, 2014 | Comment Now 
Asks court to rule on mass surveillance.
 
Router hacking competition announced for Defcon 
By Juha Saarinen | Jul 21, 2014 | Comment Now 
Compelling manufacturers to lift their game.
 
Android devices leak location data 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Other operating systems also affected by privacy hole.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
Germany ends Verizon contract over NSA concerns 
 
Leaked trade deal could threaten data sovereignty  
By Juha Saarinen | Jun 20, 2014 | Comment Now 
Radical deregulation of financial markets proposed.
 
Cyber security incidents continue to rise: ASD 
By Juha Saarinen | Jun 19, 2014 | Comment Now 
Java considered a threat.
 
The State of IT 
Jun 13, 2014 | Comment Now 
Ranking the best and the worst of IT in Australia's states and territories.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  12%
 
Software development
  27%
TOTAL VOTES: 224

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  63%
 
No
  37%
TOTAL VOTES: 67

Vote