With cyber security now a top-level issue for all organisations, ensuring board members and senior managers understand exactly what is happening is critical.
Sean Kopelke |
09 Aug |
Read more
Attackers don’t think of their success as optional, hence the effectiveness and success of a threat hunting program is critical.
Kane Lightowler |
03 Aug |
Read more
Australian companies more prone to long business interruptions due to ransomware
David Braue |
02 Aug |
Read more
Recent attacks such as WannaCry and NotPetya have demonstrated that hackers are more familiar with the vulnerabilities of unsupported systems than many organisations themselves.
Brett Williams |
01 Aug |
Read more
Cybersecurity has gained a lot of attention in the last couple of years, no thanks to the increasing number of high profile cyberattacks across the globe.
Mark Micallef |
24 Jul |
Read more
“This call will be recorded for quality, training and verification purposes” is a familiar phrase heard when seeking assistance from an airline, bank or any type of customer service situation. However, the question that comes to mind is under what circumstances these recorded logs are used?
Richard Cookes |
24 Jul |
Read more
It’s an unfortunate reality for many small to medium-sized enterprises (SMEs) that business insurance can be expensive, especially when you take out a policy that’s as specialised as cyber liability insurance and especially if your business is primarily digital and deals with a lot of data
Richard Laycock |
21 Jul |
Read more
Usually an IT professional who has been threat hunting in an environment for six months, a year, or more, will be regarded as a senior.
Kane Lightowler |
20 Jul |
Read more
Much of the attention given to the looming General Data Protection Regulation (GDPR) coming into force next year has focused on the onerous bureaucratic requirements it will create.
Matthew Brazier |
19 Jul |
Read more
Attacks on critical national infrastructure such as power grids, communication networks and the banking sector have massive implications for any country.
Simon Howe |
14 Jul |
Read more
We have just witnessed two significant ransomware / malware attacks in as many months that caused a lot of disruption to businesses globally. Some like TNT are still struggling to recover at the time of writing this whitepaper (10-07-2017).
Ashwin Pal |
13 Jul |
Read more
Amazon Web Services (AWS), once used as a ‘testing playground’ for proof of concept has evolved in the last five years to a complex arena of possibilities. The conversation has changed from ‘how can I put my website on Amazon in a secure way?’ to ‘how can I move multiple things to the cloud but still make sure it’s secure?’.
Ashish Rajan |
10 Jul |
Read more
It almost goes without saying that distributed denial of service (DDoS) attacks have been threatening organisations globally over the past few years, damaging corporate reputations and causing down time that has inconvenienced customers at best and crippled businesses at worst.
Robin Schmitt |
02 Jul |
Read more
As Australian businesses gears up for the financial year-end, it may well be time to review your security settings and general cyber hygiene.
Brett Callaughan |
23 Jun |
Read more
While cloud automation can help organisations become significantly more agile and improve security, it can also expand the enterprise attack surface, creating new vulnerabilities and risks in what becomes an increasingly dynamic and complex environment.
Chris Smith |
23 Jun |
Read more
As enterprise IT infrastructures become increasingly complex, reducing mean-time-to-detect and mean-time-to-respond metrics have become top priorities for every security team.
Simon Howe |
20 Jun |
Read more
The traditional approach to cybersecurity has focused on creating a secure perimeter around an organisation's IT assets and then carefully controlling access.
Dick Bussiere |
15 Jun |
Read more
It’s not surprising that data breaches are slowly making their way up the list of business executives’ biggest fears.
Richard Laycock |
12 Jun |
Read more
Security teams are having to defend their organisations from larger, more complex and more frequent DDoS attacks.
Tim Murphy |
08 Jun |
Read more
Cloud technology is one of the most talked about topics in today’s IT world.
Siva Chelladurai |
06 Jun |
Read more