News & Events



NotPetya Update

Reputable anti-virus vendors have begun to release signature files capable of stopping and detecting this new variant. Read More…

Media Release

Pasted Graphic 1

NotPetya Ransomware Attack: What You Need to Know and Do

A new strain of ransomware, known as ‘NotPetya’, has impacted individuals, private companies and public organisations including banks, airports and government organisations across Europe over the last 24 hours. Read More…

Media Release


WannaCry: What You Need to Know and Do

An international ransomware computer attack that uses a piece of malicious software, Read More…

Press Release


Aura Information Security’s Cyber Security Tips for World Password Day

May 4th marks World Password Day, a global initiative to raise awareness around password security. Read More…

Media Release


New e-learning tool to help NZ businesses reduce employee cyber risk

Leading information security provider, Aura Information Security, Read More…

Media Release


Aura Information Security Bolsters Leadership Team

Aura Information Security has appointed industry expert Tom Moore to the role of Practice Manager for its New Zealand and Australian operations. Read More…

Philippe Langlois



Find out more about this year's 31c0n conference speakers Read More…

Media Release


New Year, New Announcement

Five more speakers have been added to the line-up for 31c0n, New Zealand’s newest cyber security conference taking place in February 2017. Read More…

Media Release


31c0n Cyber Security Conference

In February 2017, Aura Information Security will host the first ever 31c0n cyber security conference. The event will see some of the world’s most respected cyber security researchers and speakers gather right here in New Zealand for a period of 48 hours. For more information, or to buy tickets, click here. To keep up-to-date follow @31c0n on Twitter. Read More…

Sai Honig


Can you see into your cloud?

In real estate, the most important word is “location”. When it comes to cloud technologies, perhaps the most important word is “visibility”. You cannot protect what you cannot see and in the case of cloud, visibility is often (for lack of a better word) – “cloudy”.
Read More…

Sai Honig


People, Process and Technology in Cloud Security

There has been much written about the transformation occurring with the use of cloud technology. Words such as “revolutionary”, “game-changing” and “democratisation of technology” have all been used. Read More…

Sai Honig


Disaster Recovery in the Cloud

It is fair to say that most businesses today are heavily reliant on computer systems. Even if systems were to go down for a just short period of time, the impact on a business can range from financial loss to the worst possible scenario – loss of life. Read More…