There's no coke and hookers in the cloud 
By Brett Winterford | Sep 17, 2014 | Comment Now 
[Blog post] Where did the love go?
 
Telstra takes 85k requests for user data in 12 months 
By Allie Coyne | Sep 1, 2014 | Comment Now 
Releases first full-year transparency report.
 
Vodafone reveals global extent of government wiretapping 
Jun 9, 2014 | Comment Now 
Pushes Australian Government for greater transparency.
 
Health finally takes IBM outsourcing deal to tender 
By Allie Coyne | Jun 2, 2014 | Comment Now 
Draws the line at six renewals over 14 years.
 
Tasmanian emergency comms in dire state 
By Allie Coyne | May 9, 2014 | Comment Now 
Stalemate over whole-of-gov network.
 
CenITex to cut 60 more staff 
By Allie Coyne | May 8, 2014 | Comment Now 
Not enough revenue coming in.
 
Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
Govt begins review of emergency services spectrum 
By Allie Coyne | Mar 4, 2014 | Comment Now 
Telstra, Police Federation continue to fight for access.
 
Last drinks for NBN provisioning nirvana 
By Ry Crozier | Feb 4, 2014 | Comment Now 
Analysis: ISPs concerned about integration overhead for Malcolm's MTM.
 
How to build business services 
Jan 24, 2014 | Comment Now 
Australian IT organisations are under pressure to store every piece of data generated in the workplace in perpetuity, and to simultaneously provide richer, user-friendly access ...
 
Qld Transport takes first step in systems overhaul 
By Allie Coyne | Nov 29, 2013 | Comment Now 
Offers project brief to market.
 
Telstra Global nears transformation finish-line 
By Ry Crozier | Nov 21, 2013 | Comment Now 
'Heart-lung' systems transplant comes in ahead of schedule.
 
Suncorp in three-month cloud sprint 
Nov 14, 2013 | Comment Now 
Web sites, mobile apps, BI now hosted on Amazon.
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Mobile OS updates shape as turf war 
By Ry Crozier | Oct 25, 2013 | Comment Now 
Telstra, Optus, VHA vow to keep testing smartphone updates.
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Labor 'underestimated' NBN construction challenge 
By Ry Crozier | Oct 11, 2013 | Comment Now 
Targets set too high in start-up phase.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1372

Vote