Vodafone reveals global extent of government wiretapping 
Jun 9, 2014 | Comment Now 
Pushes Australian Government for greater transparency.
 
Health finally takes IBM outsourcing deal to tender 
By Allie Coyne | Jun 2, 2014 | Comment Now 
Draws the line at six renewals over 14 years.
 
Tasmanian emergency comms in dire state 
By Allie Coyne | May 9, 2014 | Comment Now 
Stalemate over whole-of-gov network.
 
CenITex to cut 60 more staff 
By Allie Coyne | May 8, 2014 | Comment Now 
Not enough revenue coming in.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Govt begins review of emergency services spectrum 
By Allie Coyne | Mar 4, 2014 | Comment Now 
Telstra, Police Federation continue to fight for access.
 
How to build business services 
Jan 24, 2014 | Comment Now 
Australian IT organisations are under pressure to store every piece of data generated in the workplace in perpetuity, and to simultaneously provide richer, user-friendly access ...
 
Telstra Global nears transformation finish-line 
By Ry Crozier | Nov 21, 2013 | Comment Now 
'Heart-lung' systems transplant comes in ahead of schedule.
 
Suncorp in three-month cloud sprint 
Nov 14, 2013 | Comment Now 
Web sites, mobile apps, BI now hosted on Amazon.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Mobile OS updates shape as turf war 
By Ry Crozier | Oct 25, 2013 | Comment Now 
Telstra, Optus, VHA vow to keep testing smartphone updates.
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
 
Yahoo pays out $12.50 bug bounty 
By Ry Crozier | Oct 1, 2013 | Comment Now 
As store credit for Yahoo gear, researchers say.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
'Watering hole' attacks rise in prominence 
Sep 24, 2013 | Comment Now 
But have internet users learned anything?
 
MyNetFone slams ACCC's redaction fightback 
By Ry Crozier | Sep 19, 2013 | Comment Now 
Argues equal weight for all information.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  30%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 998

Vote