Editor's Desk
0

A beginner’s guide to bug bounty programmes

Bug bounty programmes are a way of encouraging the security community to work together to identify and responsibly disclose security vulnerabilities located within a predefined scope. In return for the…

Contributors
0

ACSM Issue 2 – Editor’s Desk

Since publishing Issue 1 of ACSM, it seems that cyber security has been in the headlines as many times as Donald Trump – and in some cases because of Donald…

White Papers & Research
Information Security
0

INFORMATION SECURITY: Not just for hackers

Hardly a day goes by without reading about the information security skills gap. Changing IT landscapes (e.g. virtualization, cloud, BYOD, IoT, BlockChain, AI) coupled with increasing technology reliance, attack sophistication…

0

AISA Perth Conference 2017 – Call for Papers

AISA is pleased to invite current members to submit a paper for AISA Perth Conference 2017, being held at the Crown, on the 17 November. The theme of this year’s conference is “Collaboration: Perth” All submissions will be reviewed equally…