STEM skills need lifelong nurturing 
By David Havyatt | Oct 15, 2014 | Comment Now 
[Blog post] A problem too big for the political cycle.
 
Black Hat cancels talk on how to crack Tor 
Jul 22, 2014 | Comment Now 
Research not approved for public release.
 
Social engineering threat tops infosec risks: ASD 
By Munir Kotadia | Mar 18, 2014 | Comment Now 
Agencies told to avoid bait.
 
In pictures: #BlackHat 2013 wrap 
By SC Australia Staff | Aug 2, 2013 | Comment Now 
Black Hat 2013 in Las Vegas is underway. The signature conference is one of a series of technical information security conferences that bring together thought leaders from all ...
 
In pictures: #BlackHat 2013 
By Darren Pauli | Aug 1, 2013 | Comment Now 
Black Hat 2013 in Las Vegas is underway. The signature conference is one of a series of technical information security conferences that bring together thought leaders from all ...
 
NSA chief defends surveillance programs at Black Hat 
By Dan Kaplan | Aug 1, 2013 | Comment Now 
Privacy advocate Marlinspike calls warm audience reception 'disgusting'.
 
Photos: Monash Uni's new tech innovation hub 
By Charis Palmer | Jul 31, 2013 | Comment Now 
Teaching centre aims to transform manufacturing.
 
Vale security researcher Barnaby Jack 
By Dan Kaplan | Jul 29, 2013 | Comment Now 
Medical device hacker remembered.
 
Hundreds of millions at risk from SIM card vulnerability  
 
Femtocell vuln allows mobile call, SMS, data interception 
 
Black Hat hosts 110 talks 
By Dan Kaplan | Jun 5, 2013 | Comment Now 
CCTVs, mobile phone chargers to be pwned.
 
NextDC appoints IT chief 
Feb 4, 2013 | Comment Now 
Prominent Red Hat executive lands plum job.
 
Tonkin Consulting pursues private cloud 
By Joshua Gliddon | Dec 13, 2012 | Comment Now 
IBM part of flexibility strategy.
 
WorleyParsons licenses 'unlimited' engineering software 
 
Calibre overhauls IT 'police' department 
By Liz Tay | Sep 18, 2012 | Comment Now 
Firm's first CIO rebuilds strategy.
 
WorleyParsons buys new data management software 
By Ry Crozier | Sep 14, 2012 | Comment Now 
Expands scope of existing software agreement.
 
App detects compromised, jailbroken iOS devices 
By Darren Pauli | Jul 25, 2012 | Comment Now 
Don't wait for iOS malware.
 
Downer EDI kicks off major IT transformation 
By Ry Crozier | Mar 1, 2012 | Comment Now 
Outsources IT infrastructure, plans application overhaul.
 
Meet Westpac's new technology leaders 
By Brett Winterford | Feb 6, 2012 | Comment Now 
Engineering realigned under CTO.
 
Security expert finds Android 'bugs'  
By Jim Finkle | Aug 15, 2011 | Comment Now 
Row over whether in OS or third-party code.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 319

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 123

Vote