Queensland Govt information security goes backwards 
By Paris Cowan | 1 day 22 hours ago | Comment Now 
Auditor finds system controls lacking.
 
Academics get personal over big data 
By Brett Winterford | 2 days ago | Comment Now 
De-identification the latest privacy battleground.
 
FireEye caught up in responsible disclosure furore 
By Juha Saarinen | 3 days ago | Comment Now 
FireEye Malware Analysis System 6.4.1 has multiple vulnerabilities.
 
US intelligence committee approves cybersecurity bill 
3 days ago | Comment Now 
Gives tick to data sharing between public, private sectors.
 
Web companies rush to plug serious cross-domain hole 
By Juha Saarinen | 4 days ago | Comment Now 
Google and other large properties vulnerable.
 
US arrests Russian politician's son over hacking theft 
 
Queensland Health to get new IT boss 
By Paris Cowan | 4 days ago | Comment Now 
Ray Brown sidelined.
 
Kicking the XP habit is hard 
By Juha Saarinen | 4 days ago | Comment Now 
[Blog post] Nobody should use XP any more, but...they do.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | 5 days ago | Comment Now 
No battery checks required for locals bound for US.
 
Minister defends NZ's slow migration off XP 
By Juha Saarinen | 5 days ago | Comment Now 
But opposition slams waste of taxpayer money.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | 6 days ago | Comment Now 
Passengers asked to prove devices have power.
 
Nine out of ten NSA files relate to ordinary web users  
6 days ago | Comment Now 
Unintended targets caught up in the hunt for intelligence.
 
Building an InfoSec intelligence function 
Jul 4, 2014 | Comment Now 
SC Magazine survey asks whether Australia’s InfoSec community have threat actors in their sights?
 
Victorian govt mobile apps lack privacy policy 
By Allie Coyne | Jul 4, 2014 | Comment Now 
Commissioner checks on privacy by design progress.
 
Google blocks leaked Goldman Sachs email 
Jul 3, 2014 | Comment Now 
Confidential data not accessed.
 
US Govt asks energy firms to check systems after attacks 
Jul 3, 2014 | Comment Now 
'Energetic Bear' group disrupts control systems.
 
ISPs sue UK spies over network attacks 
By Juha Saarinen | Jul 3, 2014 | Comment Now 
Snowden leaks expose surveillance operations.
 
Goldman Sachs wants Google to delete email after leak 
 
MacGibbon to lead Dimension Data security business 
By Penny Wolf | Jul 2, 2014 | Comment Now 
Brings cybercrime expertise to commercial sector.
 
Telstra buys shares in two-factor authentication firm 
By Allie Coyne | Jul 2, 2014 | Comment Now 
Boosts IT security portfolio.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  23%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 552

Vote