Demand for identity and access management (IAM) solutions is driving new investments across government agencies securing cloud and citizen services.
A presentation by border protection minister Scott Morrison will highlight the role of biometrics in the government's Customs-Immigration reinvention.
The rise of bring your own device (BYOD) demand is forcing government departments to reconsider their assumptions about smartphone security.
Government agencies are targeted more frequently by hackers than any other industry, an analysis by security vendor FireEye has found.
SA Police will use a mobile fingerprint scanning biometric system from NEC to confirm the identity of suspects while still on the scene.
Members of the public have until 7 March to comment on the government's online child safety measures, which include faster takedown of social-media content.
Brisbane-based data recovery firm Kroll Ontrack sees everything from waterlogged hard drives to lost movie masters. Here are 2013's worst data disasters.
Government contractor Lockheed Martin will build up its cybersecurity skills capability through a new cyber security centre opened this month in the ACT.
Government organisations are using more security-compromised applications than organisations in four other industries, a Check Point report has concluded.
AIIA says the Australian Bureau of Statistics must increase its monitoring and reporting of e-government ICT initiatives to boost Australia's e-gov standing
DSD certification for Good Technology's mobile security tech will empower government bodies wanting to introduce BYOD (bring your own device) strategies.
The Defence Signals Directorate (DSD) is the Australian government's peak information security body. GTR asks how they keep up with ever-changing threats.
Tight security controls have prevented Australia becoming a major malware host but user ignorance and the crush of new attacks still threaten governments.
A council of major US companies has pushed the government for greater information-sharing legislation to improve public-private cyber security cooperation.
Ever more-determined hackers and strong growth in IT spending, predominantly on PCs and mobile devices, will make mobile security a key priority in 2013.