<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2114085292224199&amp;ev=PageView&amp;noscript=1">

Security in Focus

The four pillars approach to ensuring effective personal information ...

With organisations gathering increasing volumes of personal information about their clients, ensuring it remains secure has never been 
READ MORE

The evolution of hacking and how small to medium businesses can ...

The popular stereotype of a cyber hacker tends to be a young, highly skilled person sitting in a darkened room surrounded by sophisticated computer equipment. It’s an ...
READ MORE

The rise of the "on-demand" Chief Information Security Officer

As companies strive to improve their levels of security in the midst of increasing cyber threats, many are finding it difficult to recruit sufficient numbers of skilled ...
READ MORE

IT security increasingly becoming a board-level issue

Many organisations have traditionally placed responsibility for their cybersecurity squarely in the hands of the IT department. This is a situation that is now rapidly ...
READ MORE

Protecting personal identities in an increasingly digital world

With a growing proportion of modern life being conducted online, the use of digital identities has never been more important and widespread. Used for everything from ...
READ MORE

Enterprise Security Architecture

Imagine we were given all the individual parts of a car and were asked to put it together, without any design or architecture documents. Firstly, it would be nearly ...
READ MORE

5 Billion Vulnerable Bluetooth Devices

Last night, Armis lab revealed eight new vulnerabilities in the Bluetooth stack that would allow a (fairly close) remote attacker to gain root/system level access to a ...
READ MORE

Press Release: Content Security join forces with Wombat Security ...

Content Security joins forces with Wombat Security Technologies to help Australian Organizations combat Information Security Threats and Malicious Activity 
READ MORE

Red Teaming vs Penetration Testing - What’s the Difference?

Traditional penetration testing is crucial to security, but can be limited due to time and scope constraints. In comparison, Red Team campaigns seek to remove this ...
READ MORE

What is Threat Hunting?

The terms blue team, defender and threat hunter are all synonymous with each other. Depending on who you talk to, you may get a different answer. Network Administrators ...
READ MORE