Telstra to buy managed network specialist Bridge Point 
By Allie Coyne | Oct 15, 2014 | Comment Now 
Latest acquisition bolsters NAS unit.
 
BOQ signs with HP for five more years 
By Allie Coyne | Oct 9, 2014 | Comment Now 
Long-running partner wins back IT services business.
 
There's no coke and hookers in the cloud 
By Brett Winterford | Sep 17, 2014 | Comment Now 
[Blog post] Where did the love go?
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Vodafone reveals global extent of government wiretapping 
Jun 9, 2014 | Comment Now 
Pushes Australian Government for greater transparency.
 
Health finally takes IBM outsourcing deal to tender 
By Allie Coyne | Jun 2, 2014 | Comment Now 
Draws the line at six renewals over 14 years.
 
Tasmanian emergency comms in dire state 
By Allie Coyne | May 9, 2014 | Comment Now 
Stalemate over whole-of-gov network.
 
CenITex to cut 60 more staff 
By Allie Coyne | May 8, 2014 | Comment Now 
Not enough revenue coming in.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Govt begins review of emergency services spectrum 
By Allie Coyne | Mar 4, 2014 | Comment Now 
Telstra, Police Federation continue to fight for access.
 
How to build business services 
Jan 24, 2014 | Comment Now 
Australian IT organisations are under pressure to store every piece of data generated in the workplace in perpetuity, and to simultaneously provide richer, user-friendly access ...
 
Telstra Global nears transformation finish-line 
By Ry Crozier | Nov 21, 2013 | Comment Now 
'Heart-lung' systems transplant comes in ahead of schedule.
 
Suncorp in three-month cloud sprint 
Nov 14, 2013 | Comment Now 
Web sites, mobile apps, BI now hosted on Amazon.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Mobile OS updates shape as turf war 
By Ry Crozier | Oct 25, 2013 | Comment Now 
Telstra, Optus, VHA vow to keep testing smartphone updates.
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 339

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote