IIA shuts down 
By Allie Coyne | Mar 24, 2014 | Comment Now 
Comms Alliance takes over operations.
 
DFAT $715m upgrade wrestles with dying hardware 
By John Hilvert | Oct 11, 2013 | Comment Now 
Mobile to feature in new strategy.
 
Treasury makes business case for iPads 
By John Hilvert | Sep 24, 2013 | Comment Now 
Also considering Windows options.
 
IIA launches infosec industry coordination council 
By Allie Coyne | Sep 3, 2013 | Comment Now 
Industry to lobby Government.
 
Technology lobbyists prepare for regime change 
By John Hilvert | Sep 3, 2013 | Comment Now 
Analysis: Who's who in the IT lobbying game.
 
IIA to launch national online security council 
By Allie Coyne | Sep 3, 2013 | Comment Now 
Industry to lobby Government.
 
IIA seeks election pledges for tech startups 
Aug 20, 2013 | Comment Now 
Politicians 'distracted' by mining, manufacturing.
 
Bridge Budapest: Hungarian startups cultivate ICT skills 
By John Hilvert | Aug 12, 2013 | Comment Now 
Prezi, LogMeIn and Ustream pool resources to attract talent.
 
Agency CIO questions new Fed cloud rules 
By John Hilvert | Jul 30, 2013 | Comment Now 
Onerous requirements make public cloud 'too hard'.
 
UK Govt pulls plug on large IT outsourcing deals 
By John Hilvert | Jul 26, 2013 | Comment Now 
New regime brings price pressure from small players.
 
Finance eyes new ceiling for cloud contracts 
By John Hilvert | Jul 26, 2013 | Comment Now 
Data centre panel requirements slashed.
 
Centrelink reaps savings with mobile apps 
By John Hilvert | Jul 25, 2013 | Comment Now 
Almost one million downloads in past year.
 
DSD to coordinate new Cyber Security Centre 
By John Hilvert | Jun 13, 2013 | Comment Now 
Defends intelligence work in light of PRISM.
 
DSD to coordinate new Cyber Security Centre 
By John Hilvert | Jun 13, 2013 | Comment Now 
Defends intelligence work in light of PRISM.
 
Government agencies cold on BlackBerry 
By John Hilvert | Jun 12, 2013 | Comment Now 
Decision shifts from security to end-user demand.
 
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Data breach laws to drive class actions: IIA 
By Allie Coyne | Jun 4, 2013 | Comment Now 
'Real risk of harm' seen as ambiguous.
 
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Data breach laws will drive class actions: IIA 
By Allie Coyne | May 31, 2013 | Comment Now 
'Real risk of harm' seen as ambiguous.
 
What to expect in IT for Budget 2013 
By John Hilvert | May 13, 2013 | Comment Now 
Staffing, eHealth and cyber security investments may peak.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1384

Vote