Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
DFAT $715m upgrade wrestles with dying hardware 
By John Hilvert | Oct 11, 2013 | Comment Now 
Mobile to feature in new strategy.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
 
Yahoo pays out $12.50 bug bounty 
By Ry Crozier | Oct 1, 2013 | Comment Now 
As store credit for Yahoo gear, researchers say.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
'Watering hole' attacks rise in prominence 
Sep 24, 2013 | Comment Now 
But have internet users learned anything?
 
Treasury makes business case for iPads 
By John Hilvert | Sep 24, 2013 | Comment Now 
Also considering Windows options.
 
Technology lobbyists prepare for regime change 
By John Hilvert | Sep 3, 2013 | Comment Now 
Analysis: Who's who in the IT lobbying game.
 
McAfee threat report highlights mobile attacks 
By Adam Greenberg | Aug 22, 2013 | Comment Now 
McAfee explores what cyber problems are trending in its second-quarter threat report.
 
Bridge Budapest: Hungarian startups cultivate ICT skills 
By John Hilvert | Aug 12, 2013 | Comment Now 
Prezi, LogMeIn and Ustream pool resources to attract talent.
 
NSW Police mull portal, app for reporting crimes 
By Ry Crozier | Aug 2, 2013 | Comment Now 
May cover reporting of cybercrime.
 
Agency CIO questions new Fed cloud rules 
By John Hilvert | Jul 30, 2013 | Comment Now 
Onerous requirements make public cloud 'too hard'.
 
UK Govt pulls plug on large IT outsourcing deals 
By John Hilvert | Jul 26, 2013 | Comment Now 
New regime brings price pressure from small players.
 
Finance eyes new ceiling for cloud contracts 
By John Hilvert | Jul 26, 2013 | Comment Now 
Data centre panel requirements slashed.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 341

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote