<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2114085292224199&amp;ev=PageView&amp;noscript=1">

Security in Focus

5 Billion Vulnerable Bluetooth Devices

Last night, Armis lab revealed eight new vulnerabilities in the Bluetooth stack that would allow a (fairly close) remote attacker to gain root/system level access to a ...
READ MORE

Press Release: Content Security join forces with Wombat Security ...

Content Security joins forces with Wombat Security Technologies to help Australian Organizations combat Information Security Threats and Malicious Activity 
READ MORE

Red Teaming vs Penetration Testing - What’s the Difference?

Traditional penetration testing is crucial to security, but can be limited due to time and scope constraints. In comparison, Red Team campaigns seek to remove this ...
READ MORE

What is Threat Hunting?

The terms blue team, defender and threat hunter are all synonymous with each other. Depending on who you talk to, you may get a different answer. Network Administrators ...
READ MORE

ASD Essential Eight - What needs to be done?

  • Ken Pang
  • 03.03.2017
The Australian Signals Directorate (ASD) has recently updated their list of “Top 4” security controls, to an “Essential Eight”. As the Australian Government Agency for ...
READ MORE

Holiday Session and App ID Theft: An expensive and dangerous ...

  • Saaim Khan
  • 21.12.2016
It’s that time of the year again and security experts are publishing warnings about “fake apps”, but with a twist. "App ID Theft" has been sighted just in time to ...
READ MORE

Privileged Access Management – Not a choice anymore.

  • Anshul Pandey
  • 07.12.2016
It has become quite challenging for organisations to implement and maintain good information security posture because of changing network landscape. With the uptake in ...
READ MORE

Threat Hunting – A Proactive Approach to Security

  • Ken Pang
  • 07.12.2016
Threat Hunting is the term used to describe the proactive approach to cyber security that includes finding, identifying and understanding the threats and malicious ...
READ MORE

State of ISMS in Australia

  • Saaim Khan
  • 29.11.2016
Being a GRC consultant requires continuous research and study; our team is always looking up new findings, studying changes to frameworks and improving our team ...
READ MORE

Securing a Software Defined Network

  • Ken Pang
  • 17.11.2016
The virtualisation of storage and compute has brought substantial benefit to the IT industry. Not only is compute power and storage used far more efficiently, ...
READ MORE