Security in Focus

Protecting personal identities in an increasingly digital world

With a growing proportion of modern life being conducted online, the use of digital identities has never been more important and widespread. Used for everything from ...
READ MORE

Enterprise Security Architecture

Imagine we were given all the individual parts of a car and were asked to put it together, without any design or architecture documents. Firstly, it would be nearly ...
READ MORE

5 Billion Vulnerable Bluetooth Devices

Last night, Armis lab revealed eight new vulnerabilities in the Bluetooth stack that would allow a (fairly close) remote attacker to gain root/system level access to a ...
READ MORE

Press Release: Content Security join forces with Wombat Security ...

Content Security joins forces with Wombat Security Technologies to help Australian Organizations combat Information Security Threats and Malicious Activity 
READ MORE

Red Teaming vs Penetration Testing - What’s the Difference?

Traditional penetration testing is crucial to security, but can be limited due to time and scope constraints. In comparison, Red Team campaigns seek to remove this ...
READ MORE