Security operations teams know that log management is important, yet with every operating system, network device and application writing its own set of activity-related events, how do Security Information and Event Management (SIEM) system administrators decide which security logs are important and which should be ignored. Let’s spend some time looking at today’s threat environment and from there determine a suitable answer.
Read More
The perfect cyber security storm that COVID-19 created has ushered in new cyber security operating models for many businesses. Many organisations are now switching focus from network security risk to endpoint security as a result of the move to working from home.
Read More
The new Australian Cyber Security Strategy 2020 lays down some interesting plans for the coming years relating to how the Federal Government will enhance its own cyber capability, while introducing legislation that affects all companies.
Read More
Cyber security staff are not immune to companies re-evaluating their approaches to home-working, office space requirements, travel and global operations in light of the adaptions they have been forced to make during the pandemic.
Read More
All businesses, job roles, departments and functions require performance management. Security is no different and this is now being seen as critical within the compliance and audit functions as part of the management of cyber risk.
Read More
We are used to dealing with viruses in cyber security. They are one of our most familiar threats. New ones come out all the time, we study them, we understand their signatures, and then we update the protection of our population of systems, devices and users to detect them and prevent infection.
Read More
As 2019 draws to a close, one thing is certain – the management of cyber risk is becoming a mainstream, front and centre, business imperative. Audit, compliance, security and governance are demanding cyber risks are managed with more accuracy and in a shorter timescale. Read the 2020 Cyber Security Predictions paper.
Read More
The Australian Parliament hack, dubbed Australia’s “first national cyber crisis” by the Australian Signals Directorate, shows us all too clearly the risks associated with a targeted cyber breach. When valuable information is accessed the damage can be irreversible. This is particularly true for any country’s critical infrastructure sector. The enduring question remains, realistically what can organisations do to fend off the advances from sophisticated, targeted attacks?
Read More
One thing that Huntsman (and all B2B companies) consider when creating marketing material is what terms people use to search for solutions within the orbit of the capabilities we provide (in our case cyber security).
Read More
A contemporary defensive cyber security model, known as zero trust, requires organisations to fully develop and integrate the means to detect unwanted or suspicious behaviour throughout their business architecture. The legacy view that cyber security is fought on the perimeter battlefront doesn’t respect that most attacks originate from internal systems and applications already compromised. So, what does a pivot to zero trust mean for organisations who are keen to adopt this comprehensive approach to cyber security?
Read More