Secure Internet Storage Solutions

Secure-ISS is a Queensland company committed to resolving security compliance issues. We are focused on providing Cyber Security Consultancy Services to business and government in Australia and the Asia Pacific region. Secure-ISS understands the associated risks for organizations not properly protected from Cyber Security Threats. When the unexpected happens, organizations can not only suffer a monetary loss but also from a credibility standpoint.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

PLATFORM SECURITY

VERACODE RESEARCH REVEALS SOFTWARE SUPPLY CHAIN SECURITY SHORTFALLS FOR PUBLIC SECTOR

Veracode | March 30, 2022

news image

Veracode, a leading global provider of application security testing solutions, has released new findings that show the public sector has the highest proportion of security flaws in its applications and maintains some of the lowest and slowest fix rates compared to other industry sectors. Analysis of data collected from 20 million scans across half a million applications revealed these sector-specific findings as part of Veracode’s annual report on the State of Software Security (SOSS).
Read More

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

news image

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More

GRC BECOMES CRITICAL, AS CYBERATTACKS, DATA FRAUDS EMERGE AS HIGH-IMPACT THREATS

SAP | May 13, 2020

news image

The last year WEF Report on significant global threats lists cyberattacks and data fraud as high-impact threats in the near future. New-generation GRC tools recognise that business process flows are dynamic and fluid, and hence enable us to build dynamic...

Read More

DATA SECURITY

CYCOGNITO TEAMS WITH INTEL 471 TO BOLSTER CYBER THREAT INTELLIGENCE CAPABILITIES

CyCognito | December 13, 2021

news image

CyCognito, the leading provider of external attack surface management and attack surface protection solutions, today announced that it has established a new alliance with Intel 471, a premier cybercrime intelligence provider. CyCognito addresses a fundamental security gap created when organizations use the internet to create IT ecosystems that span on-premises, cloud, partner and subsidiary environments. In licensing the threat intelligence collected by Intel 471, CyCognito is fur...

Read More
news image

PLATFORM SECURITY

VERACODE RESEARCH REVEALS SOFTWARE SUPPLY CHAIN SECURITY SHORTFALLS FOR PUBLIC SECTOR

Veracode | March 30, 2022

Veracode, a leading global provider of application security testing solutions, has released new findings that show the public sector has the highest proportion of security flaws in its applications and maintains some of the lowest and slowest fix rates compared to other industry sectors. Analysis of data collected from 20 million scans across half a million applications revealed these sector-specific findings as part of Veracode’s annual report on the State of Software Security (SOSS).
Read More

news image

HACKERS CAN USE ULTRASONIC WAVES TO SECRETLY CONTROL VOICE ASSISTANT DEVICES

The hacker news | March 02, 2020

Researchers have discovered a new means to target voice-controlled devices by propagating ultrasonic waves through solid materials in order to interact with and compromise them using inaudible voice commands without the victims' knowledge.Called "SurfingAttack," the attack leverages the unique properties of acoustic transmission in solid materials such as tables to "enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer ...

Read More
news image

GRC BECOMES CRITICAL, AS CYBERATTACKS, DATA FRAUDS EMERGE AS HIGH-IMPACT THREATS

SAP | May 13, 2020

The last year WEF Report on significant global threats lists cyberattacks and data fraud as high-impact threats in the near future. New-generation GRC tools recognise that business process flows are dynamic and fluid, and hence enable us to build dynamic...

Read More
news image

DATA SECURITY

CYCOGNITO TEAMS WITH INTEL 471 TO BOLSTER CYBER THREAT INTELLIGENCE CAPABILITIES

CyCognito | December 13, 2021

CyCognito, the leading provider of external attack surface management and attack surface protection solutions, today announced that it has established a new alliance with Intel 471, a premier cybercrime intelligence provider. CyCognito addresses a fundamental security gap created when organizations use the internet to create IT ecosystems that span on-premises, cloud, partner and subsidiary environments. In licensing the threat intelligence collected by Intel 471, CyCognito is fur...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us