Organisations introducing threat hunting into their operational security team’s remit will encourage a proactive approach to detecting and responding to sophisticated cyber threats. Threat hunting demands disciplined and focused effort using threat...
Read MoreAs cyber risks now get discussed at all levels, there is a need for businesses to understand the scale of cyber threats and the performance of their security operations functions. This is much like any other strand of the organisational activity. ...
Read MoreThe Australian Cyber Security Centre (ACSC) has created several publications aimed at helping critical infrastructure providers protect ICT systems from the escalating threat of nation state cyber-attack. The Australian Government has recently stated...
Read MoreOn Friday 19th June, the Australian Prime Minister gave a press conference outlining an intense and persistent cyber attack against Australian organisations, allegedly originating from an overseas adversary. The Prime Minister confidently stated that...
Read MoreThis blog post “CMMC – Restrict Admin Privileges” is the tenth in a series on Cybersecurity Maturity Model Certification (CMMC) – a US Department of Defense (DoD) initiative that imposes requirements on contractors and subcontractors to help safeguard...
Read MoreIn the first quarter of 2020 IT and security teams around the world faced an unprecedented challenge. The coronavirus pandemic grew in a matter of weeks to a phenomenon that would disrupt businesses, lives and the economy like nothing else we have faced...
Read MoreThe 2019-20 'Interim Report on Key Financial Controls of Major Entities' has been released. The Australian National Audit Office's (ANAO) review focused on the financial and HR systems of eighteen Australian Government agencies. The report revealed...
Read MoreCyber hygiene is a relatively new term to describe the basic security practices everyone should be doing to ensure their organisation remains safe from common security threats. Yet even these most basic security controls are often neglected or not implemented...
Read MoreThis blog post “CMMC – Monitoring Privileged Users” is the ninth in a series on Cybersecurity Maturity Model Certification (CMMC) - a US Department of Defense (DoD) initiative that imposes requirements on contractors and subcontractors to help safeguard...
Read MoreThe pandemic is currently ravaging people’s lives and the economy across the world. Cyber security and audit professionals, and their roles, included. Businesses are walking a narrower financial tightrope than ever before, balancing cost cutting,...
Read More