Tel +61 2 8011 0230

Featured Blogs

Cyber Risk

Three Simple Questions

In a series of blog pieces, we will be exploring several of these Security projects which we believe will shape our clients strategic view of security and risk over the next 12-18 months.

Read Blog


Software developers - security principles

What are the security principles that software developers should follow? 

Read Blog

Cyber Security Seminar Blog

CEO Shares What Keeps Him Up At Night

At a recent Banking CEOs and director’s forum in Sydney, a CEO shared what keeps him awake at night. 

Read Blog



Cyber Killchain

The Kill Chain - How Hackers Infiltrate

Have you ever taken the time to think about how hackers end up inside your organisation? 

Read Blog


The 5 Knows - Securing Your Data

The first step towards a good cyber security posture is to appreciate and understand the importance of your organisation’s data.

Read Blog

The Impending Cybersecurity Landscape 2017

The impending Cybersecurity Landscape – 2017

The cybersecurity landscape in 2016 continued to evolve in both predictable and unpredictable ways. The data breaches continued unabated, cybersecurity took a greater profile both in the corporate boardrooms and in the public sphere.

Read Blog


Why Is An Effective Security Operations Centre So Important?

Why is an effective SOC so important?

The challenges of a constantly evolving threat landscape combined with limited IT budgets as well as  the push for efficiencies in IT initiatives, heralds the need for flexible security solutions for organisations of all sizes to address the constantly evolving threat landscape.

Read Blog

How To Choose A PCI Approved Scanning Vendor

How to Choose a PCI Approved Scanning Vendor

In order to comply with the Payment Card Industry Data Security Standard (PCI DSS), merchants and service providers are required to have external vulnerability scans performed on their systems every quarter.

Read Blog

Top 3 Application Security Principles

Top 3 Application Security Principles

Tim Vernum takes us through his top 3 application security principles – a must for development teams.

Read Blog


Data Breach Notification Law

Mandatory Data Breach Notification Scheme Is On Its Way

Mandatory Data Breach Notification Scheme is on its way. Find out what you need to know and use our security checklist to ensure you are ready. 

Read Blog

Penetration Testing Uncovered - What is a Penetration Test?

Penetration Testing Uncovered - Part 1

Have you ever wondered what a company does when they do a penetration test for you?

Read Blog

How To Choose A Cybersecurity Consulting Firm For Your Penetration Tests?

How To Choose a Security Consulting Firm? 

You have no doubt lots of options available to you but beyond the hype and marketing, how do you identify the right organisation to team up with?

Read Blog


Penetration Testing and Security Skills Shortage Is An Opportunity For Australia

Security Skills Shortage is an Opportunity for Australia 

Cyber attackers continue to have  an advantage over IT organisations. 

Read Blog

Petya/ Not Petya Ransomware Attack 

Petya / NotPetya Ransomware Attack

Overnight, a major ransomware cyber-attack ‘Petya’ using a variant of the ransomware family known as GoldenEye spread across Europe and the US. 

Read Blog

LinkedIn Cybersecurity Data Breach

The Anatomy of a Breach. How does it happen?

It is an all too familiar scenario but have you ever stopped to think about how it happened and what could have been done to prevent it?

Read Blog


Westpac Account Locked? Nope, harvesting your credentials

A number of Australian inboxes received an email purporting to be from Westpac advising them that their accounts have been temporarily locked.

Read Blog

Medicare Cybersecurity Patient Data Breach

Medicare Patient Details of "any Australian" For Sale On Darknet

An investigation by Guardian Australia has uncovered a serious privacy breach and privacy concerns for all Australian Medicare Card holders.

Read Blog

Home Depot Cybersecurity Data Breach

Home Depot Security Breach

The worlds largest home improvement retailer was hit by a massive Data Breach impacting Debit and Credit Cards with over 56 million cards impacted.

Read Blog