
What is Docker? Linux containers explained
A brief introduction to lightweight, portable, flexible Docker containers and why developers love them

A brief introduction to lightweight, portable, flexible Docker containers and why developers love them

Officially launches cloud services from Sydney data centres

Peter Norvig says output of machine learning systems a more useful probe for fairness
Authorised to conduct offensive operations, subject to government oversight
New CISO to lead implementation
Offensive capabilities can be unleashed on cyber crims overseas
Destruction not money motivation for attacks which spread to Australia this week.
Gets court orders bocking new Pirate Bay mirrors
EscapeNet to operate GigCity network
Proposed legislation to implement the government’s Telecommunications Sector Security Reforms (TSSR) has received bipartisan support.
The WA government has issued updated information security guidelines, with the public release of the new Digital Security Policy (PDF) occurring in the same week as the release of a less-than-flattering report from the WA Office of the Auditor General.
The Australian Defence Force is launching a new ‘Information Warfare Division’ responsible for ‘electronic warfare’, the government announced today.
The Australian Signals Directorate has been cleared to use its offensive cyber capabilities to target “organised offshore cyber criminal networks”, the government announced today.
The Victorian government has signed off on a cyber security strategy for the state and created a new whole of government chief information security officer (CISO) role to oversee its execution.
Microsoft has migrated its Enterprise Mobility + Security (EMS) admin consoles to the Azure web-service portal, bolstering corporate mobility management efforts.
Not long after its arrival 10 years ago, the iPhone began to dominate the workplace -- first as a shadow IT device smuggled in by employees for daily chores, later as the preferred smartphone for execs. But Apple's enterprise success may not hold.
Five Eyes nations' ministers and attorney-generals have “committed to develop our engagement with communications and technology companies to explore shared solutions” around the encrypted content of communications sent by criminals.
As part of what has become an annual tradition in Western Australia, the state auditor general has slammed the security of a number of WA government IT systems.
As a money-making exercise – the sole motivation behind most ransomware – Petya was a flop.
How can a CIO today be an effective advocate of the business, when they don't come from the business?
Can the rise in importance of technology and data to enterprises mean that the ‘CIO to CEO’ route will finally open for more business technologists? What are the new skill sets that are necessary? And which elements of the old role can be safely jettisoned? Find out more in this insightful whitepaper.