ABS points fingers at IBM over Census
Inquiry doesn’t mince words over Department of Health centralised computing services contract
Telco continues to grow its security services
ASX still working to understand root cause of failover problem
Telstra says it is bringing cloud-like flexibility to connectivity
CPSU says inadequate funding for the Australian Bureau of Statistics had a significant role in the Census debacle
The Australian Bureau of Statistics says it accepted assurances from IBM that measures to deal with denial of service attacks targeting the 2016 Census were adequate.
Yahoo’s massive data breach in which at least 500 million user accounts have been hacked may be “the straw that breaks the camel’s back” and complicate its planned sale to Verizon, says Centrify.
Telstra will boost its communications technicians workforce by 1000 over the next six months, the telco said today. Telstra said the mix would include a number of full-time employees and subcontractors through Infrastructure Services Group Management.
The ASX has completed an analysis of the events that led to the temporary shut-down of its equities trading system on the morning of 19 September followed by an early market close.
“Our payment system in 2016 is still being constrained by punch cards,” Reserve Bank of Australia governor Dr Philip Lowe yesterday told the House of Representatives’ Standing Committee on Economics.
Telstra has brought its software-defined network services offerings PEN (the former Pacnet Enabled Network) and its own SDN/NFV service developed in conjunction with Cisco under the umbrella of its cloud services division.
An inquiry by a committee of the WA Legislative Assembly has called for the state’s health minister to report to parliament on why the Department of Health failed to utilise the government’s Gateway review process for ICT procurement projects with an investment value of greater than $10 million, in the wake of a major contract bungle.
Developing a computer that can be as decisive and intelligent as humans is on IBM's mind, and it's making progress toward achieving that goal.
When Yahoo said on Thursday that data from at least 500 million user accounts had been hacked, it wasn't just admitting to a huge failing in data security -- it was admitting to the biggest hack the world has ever seen.
A massive breach at Yahoo stole account details from at least 500 million users and is being blamed on state-sponsored hackers.
In the push towards digital transformation, IT leaders need real-time operational insights into application performance, user experience and business outcomes. A packed crowd gathered at the Crown Promenade in Melbourne for the CW Exchange Breakfast, sponsored by AppDynamics, to learn about the digital transformation journey - some key challenges and opportunities in transitioning to the digital era.
Centre for Quantum Computation and Communication Technology is leading a global race to develop a quantum computer
IT departments are constantly faced with the challenge of managing complex, multi-cloud environments that combine best-of-breed public and private services with traditional on-premise infrastructure. A group of IT thought leaders gathered at Vue De Monde in Melbourne to discuss their hybrid cloud journeys.
Common apps spoofed to trick users into downloading malware.
What university courses would you recommend to someone interested in the cyber security field. Working in this space I currently have basic to moderate knowledge but would be interested in obtaining an academic qualification. As someone on the ...
- Positive Vetted ICT positions - Defence intelligence and information security ACT
- Outbound Telesales VIC
- Infrastructure Project Manager - DCR Project NSW
- Test Manager (HP Quality Centre / ARIBA) NSW
- Senior Business Analyst -Change and SAP Procurement NSW
- BI Reporting Analyst ACT
- Business Analyst - Telecom Project NSW
- Senior Change Manager VIC
- Technical Business Analyst | Marketing Services NSW
- NetApp Storage Consultant WA
As big data goes mainstream, real-time analytics has emerged as the catalyst to turn insights into more immediate action.
- The Future is Encrypted. What's your defense?
- The Future is Encrypted. Manage It.
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Check your Future Risk
- See Your Traffic for What It Really Is
- How to Use Metadata to Make Data-Driven Decisions - Download NOW!
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Harnessing the Power of Metadata for Security: FIND OUT MORE