<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2114085292224199&amp;ev=PageView&amp;noscript=1">

Security in Focus

The rise of the "on-demand" Chief Information Security Officer

As companies strive to improve their levels of security in the midst of increasing cyber threats, many are finding it difficult to recruit sufficient numbers of skilled ...
READ MORE

IT security increasingly becoming a board-level issue

Many organisations have traditionally placed responsibility for their cybersecurity squarely in the hands of the IT department. This is a situation that is now rapidly ...
READ MORE

Protecting personal identities in an increasingly digital world

With a growing proportion of modern life being conducted online, the use of digital identities has never been more important and widespread. Used for everything from ...
READ MORE

Enterprise Security Architecture

Imagine we were given all the individual parts of a car and were asked to put it together, without any design or architecture documents. Firstly, it would be nearly ...
READ MORE

5 Billion Vulnerable Bluetooth Devices

Last night, Armis lab revealed eight new vulnerabilities in the Bluetooth stack that would allow a (fairly close) remote attacker to gain root/system level access to a ...
READ MORE

Press Release: Content Security join forces with Wombat Security ...

Content Security joins forces with Wombat Security Technologies to help Australian Organizations combat Information Security Threats and Malicious Activity 
READ MORE

Red Teaming vs Penetration Testing - What’s the Difference?

Traditional penetration testing is crucial to security, but can be limited due to time and scope constraints. In comparison, Red Team campaigns seek to remove this ...
READ MORE

What is Threat Hunting?

The terms blue team, defender and threat hunter are all synonymous with each other. Depending on who you talk to, you may get a different answer. Network Administrators ...
READ MORE

ASD Essential Eight - What needs to be done?

  • Ken Pang
  • 03.03.2017
The Australian Signals Directorate (ASD) has recently updated their list of “Top 4” security controls, to an “Essential Eight”. As the Australian Government Agency for ...
READ MORE

Holiday Session and App ID Theft: An expensive and dangerous ...

  • Saaim Khan
  • 21.12.2016
It’s that time of the year again and security experts are publishing warnings about “fake apps”, but with a twist. "App ID Theft" has been sighted just in time to ...
READ MORE