Communications
AISA Focus Groups – Notification of Serious Data Breaches
For AISA Members, In February we will have a special workshop across 4 branches that…
Hewlett Packard Enterprise and Microsoft Deepen Collaboration on Windows 10 Offerings – Announce Cloud Productivity and Mobility Solution Offerings (CPM)
Partnership creates industry leading solutions to accelerate enterprise transformation and drive customer satisfaction Hewlett Packard…
Cylance Positioned as a Visionary in the 2016 Gartner Magic Quadrant for Endpoint Protection Platforms
Positioned Furthest for Completeness of Vision in the Visionaries Quadrant Cylance, the company that is…
CyberArk Delivers Cloud-Based Privileged Account Security to the Endpoint
CyberArk Viewfinity Integrates Privilege Management with Application Control to Help Protect Against Malware-Based Attacks Without…
Cyber Security Delegation to Israel-Open to all from Asia, Australia and New Zealand
The Australia Israel Chamber of Commerce (AICC) will host a cyber security trade delegation to…
Tenable Network Security Supports Microsoft Azure, Securing Cloud Environments at the Speed of DevOps
Leading developer of next-generation cybersecurity software now provides enhanced security visibility across three major cloud…
1 in 10 broadly shared files in cloud apps expose sensitive and regulated data, reveals new Elastica cloud threat labs report from Blue Coat
Enterprise shadow data threat on rise as cloud app usage surges in the enterprise, opening…
ISACA’s Cybersecurity Nexus Launches Tools to Help Cyber Pros Identify Controls and Navigate Their Careers
ISACA has launched two free digital tools through its Cybersecurity Nexus (CSX): Cybersecurity Career Road…
Testing demonstrates that Ixia Network Packet Broker delivers 100 percent packet processing for 100 percent network visibility
Ixia has announced the processing performance results of an Ixia-sponsored test conducted by the Tolly Group…
Taking the Necessary Leap
Cyber security concerns continue to evolve rapidly, with new threats emerging every day. Cyber actors…
A Recipe to Reduce Mobile App Security Risk
As businesses roll-out their BYOD strategies, most CIOs and CEOs have no idea that many…
Quortus Software Core Network Enables Mobile Edge Computing
First MEC-aligned implementation of cellular core enables innovative 4G services – and points the way…
In plain sight: Avoiding loss of visibility & security in virtualized environments
Network Packet Brokers are key to mitigating enterprise network blind spots – but unless chosen…
Unisys to Deliver Enterprise Security Innovation on the AWS Cloud
Award-winning Unisys Stealth technology delivers micro-segmentation on the Amazon Web Services Cloud for improved security,…
