home.aspx
 
EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

NEPIC Digitalisation & Cyber Security Conference
NEPIC DIGITALISATION & CYBER SECURITY CONFERENCE
March 27-27, 2019
The 4th Industrial Revolution represents an extraordinary growth and productivity opportunity for manufacturing in general, however, by its very nature brings with it increased risk. During this new event for 2019, we will explore the pros and cons of the connected world we live in whilst showcasing...

Aura Information Security


Virtually every business that conducts business online is at risk of compromise by hackers, malware and other information-related crimes. Founded in 2006, Kordia’s Aura InfoSec is New Zealand’s leading provider of cyber security services. Its team of industry-leading experts – hand-picked from around the world – provide a range of services to businesses both here in New Zealand and Australia.

RELATED NEWS


There’ll be plenty for system administrators to do right up to the end of the year with Microsoft’s latest patch update round featuring fixes for nine critical vulnerabilities including one zero-day bug. The 39 flaws reported by the computing giant on Tuesday paled in comparison to the 87 posted by Adobe and represent a relatively light load, but there are important caveats. The main one is CVE-2018-8611, an elevation-of-privilege (EoP) bug that affects all supported operating system...
INFOSECURITY MAGAZINE
READ MORE

The joint report by the US Department of Homeland Security and the Federal Bureau of Investigation has a catchy name for "Russian malicious cyber activity" - Grizzly Steppe - and creates infinite opportunities for false flag operations that the US government all but promises to attribute to Russia....
SMH.COM
READ MORE

AETs, first discovered in 2010 by network security specialist Stonesoft (acquired by McAfee last year), are methods of disguise used to penetrate target networks undetected and deliver malicious payloads. Using AETs, an attacker can split apart an exploit into pieces, bypass a firewall or IPS appliance, and once inside the network, reassemble the code to unleash malware and continue an APT attack. The prevalence of these techniques has risen significantly since 2010, with millions of combination...
INFOSECURITY-MAGAZINE
READ MORE

The Internet can be compared to our climate: it is everyone’s property, and thereby at the same time no one’s property. But as well as with our climate, it is everyone’s responsibility to secure our digital environment. Recently, an interview on cyber security and data with Dick Berlijn (senior advisor) at Deloitte, HSD Premium partner, has been published....
THE HAGUE SECURITY DELTA
READ MORE

Enterprises need a centralized approach when considering a hybrid cloud security architecture, an analyst says. Plus, is user experience management an IT responsibility? Cloud security isn't for the squeamish. Protecting cloud-based workloads and designing a hybrid cloud security architecture has become a more difficult challenge than first envisioned, said Jon Oltsik, an analyst at Enterprise Strategy Group in Milford, Mass. "The goal was simple," he said. Enterprises wanted the s...
TECHTARGET
READ MORE

A security advisory published by Microsoft on Wednesday provides information on how users can protect themselves against recent attacks abusing the Dynamic Data Exchange (DDE) protocol....
SECURITY WEEK
READ MORE

EVENTS

BSI International Cyber Resilience Exchange 2019
BSI INTERNATIONAL CYBER RESILIENCE EXCHANGE 2019
March 26-26, 2019
BSI International Cyber Resilience Exchange 2019 is a one day event which brings together leading international cyber intelligence experts and innovators to share their vision of making a secure digital future a reality. The exchange comprises of keynote speakers, panel discussions and interactive s...

CS4CA USA
CS4CA USA
March 26-27, 2019
While cybercrime steadily increases in the US, the perceived complexity of data security remains a barrier for organizations to strengthen their cybersecurity strategies. Cyber risks are complex and unique to every circumstance, therefore difficult to quantify. But ultimately, all complexities can b...