iiNet subsidiary Internode has been awarded a contract to deliver cloud services to the South Australian departments of premier and cabinet, planning, transport and infrastructure (DPTI) and communities and social inclusion (DCSI).
South Australian Government - News, Features, and Slideshows
The South Australian Police (SAPOL) have been allocated $11.6 million for a number of technology projects including facial recognition, virtual reality driving simulator and firearms training simulator in the SA 2014-15 Budget.
The South Australian government has released an ICT strategy document that sets out its goal to put more government services online and and become “digital by default”.
As part of a deal with Internode, the South Australian government is investing $1.5 million in a new wireless network that will boost free Internet access in Adelaide’s central business district .
South Australia’s Independent Commissioner Against Corruption (ICAC) and Office for Public Integrity has been allocated $10.3 million for new IT systems in the 2013-14 budget.
- Ransomware explosion is the latest security wakeup call for CxOs
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- See Your Traffic for What It Really Is
- New Destination Gigamon Security Resources IS HERE
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- The Future is Encrypted. Manage It.
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- Caution: That SSL Blind Spot is Growing
- Test Your Knowledge of Network Encryption
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register