From an initial short list, the Australian Government has announced the six vendors who have made the data centre migration panel.
By Hamish Barwick | 05 May, 2011 14:46
The GFC-induced economic slowdown in Europe is having a direct impact on the growth of cybercrime and other organised crime according to the European Union’s law enforcement agency, Europol.
By Tim Lohman | 05 May, 2011 09:53
The U.S. Congress needs to pass new data security regulations for businesses in response to recent data breaches at Sony, Epsilon and other companies, members of a U.S. House of Representatives subcommittee said Wednesday.
By Grant Gross | 05 May, 2011 12:56
Another milestone in Australia’s transition to digital-only television broadcasts has passed with regional Victoria's remaining analog signals now switched off.
By Rodney Gedda | 05 May, 2011 12:22
Queensland Government agency, the Public Trustee is calling for candidates to fill the role of CIO.
By Chloe Herrick | 05 May, 2011 12:14
It sounds like a B-grade movie plot: Millions of smartphone owners are being tracked by their phones. Their mobile apps are eavesdropping on them, too. And information about their whereabouts is being sold to third parties.
By Ian Paul and Brent Rose | 05 May, 2011 00:24
Your e-mail password is your last line of defense when it comes to online privacy and security; if a hacker cracks that, they could potentially reset the passwords of and gain access to your social networks, your bank account and even your identity by taking advantage of the ubiquitous "I Forgot My Password" button.
By Alex Wawro | 05 May, 2011 00:26
Google Australia has moved to reassure Australians that any future Street View mapping will comply with privacy laws and not collect Wi-Fi data.
By Hamish Barwick | 05 May, 2011 11:39
Attention, Nexus One owners: the latest variant of Gingerbread is here! But don't get too excited as this "special" Nexus One version of Android doesn't deliver all the digital goodies that other handsets are getting.
By Chris Brandrick | 05 May, 2011 04:04
With the release of iOS 4.3.3, Apple fixes the location caching issue that sparked a controversy on mobile phone privacy last month.
By Jared Newman | 05 May, 2011 05:44
In a move to secure fraying market share against their bourgeoning competitors, RIM and Microsoft are partnering. Microsoft CEO Steve Ballmer made a surprise keynote earlier Tuesday at the Blackberry World expo in Orlando, Fla. Microsoft will integrate its Bing search and map application at the device operating system level, he said. "We're going to invest uniquely into the BlackBerry platform."
By Ilie Mitaru | 05 May, 2011 00:08
One of Research in Motion's biggest challenges in a world of the iPhone and Android has been how to keep its products fun and fresh while maintaining the high level of security its corporate users have come to rely on.
By Brad Reed | 05 May, 2011 00:47
Meru announced on Wednesday high-performance Wi-Fi access points and software designed to let enterprise IT groups replace wired Ethernet switches at the network edge.
By John Cox | 05 May, 2011 01:41
Microsoft's popular free antivirus program Security Essentials has put in a mediocre showing in the latest quarterly tests from German test outfit AV-Test.org, finishing second bottom out of 22 products.
By John E Dunn | 05 May, 2011 03:22
Would-be contestants of Simon Cowell's US X Factor might have got more public exposure than they bargained for with the news that the details of 250,000 of them have been lost after an attack on the TV show's database.
By John E Dunn | 05 May, 2011 00:12
Incorporating path control in your WAN is a critical first step along the way to deploying a full SD-WAN solution. This whitepaper looks at how you can use dynamic tools to shortcut the complex configurations and expenditures of time and resources to ultimately efficiently utilise the hybrid links that may already be deployed in the network.
With increasing levels of threats and regulations, your need for identity and access governance (IAG) has never been greater. You need to know exactly who has access to what, and make sure all access levels are appropriate. Your overall solution needs to be integrated and seamless. And it has to move fast—otherwise it's too little, too late. This white paper explores the market forces that are driving the growth of this problem.
- Fujitsu unveils Chromebook managed service offering for enterprises
- Defence extends Optus satellite contract until 2020
- Oracle gets September trial date against Rimini Street
- How getting mobile helped John Holland slash IT costs
- Data center group tightens certification rules for service providers
- An Aussie company is building the world's smallest SDN switch
- Hardcore Hardware: The Origin PC Millennium can show off its three GeForce GTX 980Ti cards from either side
- In Pictures: Hacking Team's hack curated
- In Pictures: HP Pro Slate 8 features magic pen
- Facebook to use all renewable energy in its next data center
- Petition to remove Reddit CEO tops 200K signatures
- Gartner: No help for the PC biz from Windows 10
- Google's self-driving cars are taking a road trip to Texas
- EMC sells Syncplicity to focus on core storage business
- U.S. State Department moves to block 3D-printed gun plans online