home.aspx
 
EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Abacode Cybersecurity

SHARESHARESHARE
Abacode is a cybersecurity firm solely dedicated to addressing the cyber-threat landscape for organizations throughout the world. As a Managed Security Services Provider (MSSP); Abacode has special focus on 24/7 SIEM / SOC monitoring & remediation services. This allows your team to have complete visibility and proactive remediation efforts into all of your IT networks and infrastructure, real-time. We work cohesively with your CEO, CFO, COO, internal IT leadership (CIO, CTO, CISO, VP) and/or trusted outsourced IT providers. This collaboration provides your business strategic guidance before attacks become disruptions and financial hardships.
SHARESHARESHARE

RELATED NEWS


While working on a project for the US Department of Defense, Clarifai, a New York–based AI startup had a server compromised. Multiple news outlets reported that Clarifai was working on the Defense Department’s Project Maven when a server was reportedly compromised, adding that the company failed to report the news to the Pentagon. Amy Liu, a former marketing executive at Clarifai, alleged that she was released from her post after insisting that the company report the compromised serv...
INFOSECURITY MAGAZINE
READ MORE

When it comes to incident and data breach response, it’s critical to identify the potential risks associated with a particular breach. Misapprehending certain risks can have a definite impact on your bottom line. Your organization must look beyond mere compliance fulfillment to effectively mitigate the risks associated with a breach, and, in some cases, organizations need to break the cycle of ineffective data breach response....
KROLL
READ MORE

Hackers have infiltrated the network of Telstra subsidiary Pacnet, which is one of the main data centers and undersea cable operators in Asia. The hack has exposed a significant number of the comms provider’s corporate customers, including the Australian Federal Police....
INFOSECURITY MAGAZINE
READ MORE

Although Billtrust initially didn’t release details in the aftermath of the attack, one of its customers, Wittichen Supply, told its customers Friday that the payment service had “communicated to us that our/your data has not been compromised and they are working around the clock to restore service levels,” with plans “to restore services on a measured schedule.”The incident “shows that cyberattacks, including ransomware, extend beyond the perimeter of the sin...
SC MAGAZINE
READ MORE

A group of academics, government experts, charities and others has come together to help UK boards better assess cyber risk. The Cyber Readiness for Boards initiative is being funded by the National Cyber Security Centre (NCSC) and charity the Lloyd’s Register Foundation, but will also benefit from input from University College London (UCL), the University of Reading, Coventry University, the Research Institute in Science of Cyber Security (RISCS), and training provider RESILIA. It will lo...
INFOSECURITY MAGAZINE
READ MORE

Cyber-criminals are taking advantage of a little-known feature in Gmail to escalate their scam operations more efficiently, according to new research from Agari. The email security vendor claimed in a blog post that the problem stems from what it describes as “dot accounts.” This relates to a decision by Google to allow Gmail users to own “all dotted versions” of their address. In the example given by Agari senior threat researcher, Ronnie Tokazowski, if a user registers ...
INFOSECURITY MAGAZINE
READ MORE

EVENTS

Cyber Security for Critical Assets APAC
CYBER SECURITY FOR CRITICAL ASSETS APAC
January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...