Featured Blogs

Petya/ Not Petya Ransomware Attack 

Petya / NotPetya Ransomware Attack

Overnight, a major ransomware cyber-attack ‘Petya’ using a variant of the ransomware family known as GoldenEye spread across Europe and the US. 

Read Blog

Medicare Cybersecurity Patient Data Breach

Medicare Patient Details of "any Australian" For Sale On Darknet

An investigation by Guardian Australia has uncovered a serious privacy breach and privacy concerns for all Australian Medicare Card holders.

Read Blog

westpac-scam1.png

Westpac Account Locked? Nope, harvesting your credentials

A number of Australian inboxes received an email purporting to be from Westpac advising them that their accounts have been temporarily locked.

Read Blog

 

Insights

The Impending Cybersecurity Landscape 2017

The impending Cybersecurity Landscape – 2017

The cybersecurity landscape in 2016 continued to evolve in both predictable and unpredictable ways. The data breaches continued unabated, cybersecurity took a greater profile both in the corporate boardrooms and in the public sphere.

Read Blog

 

Why Is An Effective Security Operations Centre So Important?

Why is an effective SOC so important?

The challenges of a constantly evolving threat landscape combined with limited IT budgets as well as  the push for efficiencies in IT initiatives, heralds the need for flexible security solutions for organisations of all sizes to address the constantly evolving threat landscape.

Read Blog

How To Choose A PCI Approved Scanning Vendor

How to Choose a PCI Approved Scanning Vendor

In order to comply with the Payment Card Industry Data Security Standard (PCI DSS), merchants and service providers are required to have external vulnerability scans performed on their systems every quarter.

Read Blog


Penetration Testing and Security Skills Shortage Is An Opportunity For Australia

Security Skills Shortage is an Opportunity for Australia 

Cyber attackers continue to have  an advantage over IT organisations. 

Read Blog

Top 3 Application Security Principles

Top 3 Application Security Principles

Tim Vernum takes us through his top 3 application security principles – a must for development teams.

Read Blog

Penetration Testing Uncovered - What is a Penetration Test?

Penetration Testing Uncovered - Part 1

Have you ever wondered what a company does when they do a penetration test for you?

Read Blog


LinkedIn Cybersecurity Data Breach

The Anatomy of a Breach

It is an all too familiar scenario but have you ever stopped to think about how it happened and what could have been done to prevent it?

Read Blog

Home Depot Cybersecurity Data Breach

Home Depot Security Breach

The worlds largest home improvement retailer was hit by a massive Data Breach impacting Debit and Credit Cards with over 56 million cards impacted.

Read Blog

How To Choose A Cybersecurity Consulting Firm For Your Penetration Tests?

How To Choose a Security Consulting Firm? 

You have no doubt lots of options available to you but beyond the hype and marketing, how do you identify the right organisation to team up with?

Read Blog