Japan

Security Controls & Resilience

Threat Hunting using MITRE ATTACK

Organisations introducing threat hunting into their operational security team’s remit will encourage a proactive approach to detecting and responding to sophisticated cyber threats. Threat hunting demands disciplined and focused effort using threat...

Read More

Cyber security metrics – selection bias at its best

As cyber risks now get discussed at all levels, there is a need for businesses to understand the scale of cyber threats and the performance of their security operations functions.  This is much like any other strand of the organisational activity. ...

Read More

Cyber Security for the Australian Energy Sector

The Australian Cyber Security Centre (ACSC) has created several publications aimed at helping critical infrastructure providers protect ICT systems from the escalating threat of nation state cyber-attack. The Australian Government has recently stated...

Read More

Australia Under Cyber Attack

On Friday 19th June, the Australian Prime Minister gave a press conference outlining an intense and persistent cyber attack against Australian organisations, allegedly originating from an overseas adversary. The Prime Minister confidently stated that...

Read More

CMMC – Restrict Admin Privileges

This blog post “CMMC – Restrict Admin Privileges” is the tenth in a series on Cybersecurity Maturity Model Certification (CMMC) – a US Department of Defense (DoD) initiative that imposes requirements on contractors and subcontractors to help safeguard...

Read More

ANAO cyber review of Federal Government agencies

The 2019-20 'Interim Report on Key Financial Controls of Major Entities' has been released.  The Australian National Audit Office's (ANAO) review focused on the financial and HR systems of eighteen Australian Government agencies. The report revealed...

Read More

Cyber Hygiene equals Cyber Resilience

Cyber hygiene is a relatively new term to describe the basic security practices everyone should be doing to ensure their organisation remains safe from common security threats. Yet even these most basic security controls are often neglected or not implemented...

Read More

CMMC – Monitoring Privileged Users

This blog post “CMMC – Monitoring Privileged Users” is the ninth in a series on Cybersecurity Maturity Model Certification (CMMC) - a US Department of Defense (DoD) initiative that imposes requirements on contractors and subcontractors to help safeguard...

Read More

Disruption of Audit in the time of Coronavirus

The pandemic is currently ravaging people’s lives and the economy across the world.  Cyber security and audit professionals, and their roles, included. Businesses are walking a narrower financial tightrope than ever before, balancing cost cutting,...

Read More
1 2 3 4 5 8