Japan

Security Controls & Resilience

Digital Transformation: The Cyber Security Catalyst

The adoption of cloud services is core to the Australian Government’s digital transformation strategy. Cloud services yield faster service delivery for agencies and ensure organisations only pay for what they consume. Yet, this shift to cloud introduces...

Read More

How Mature Are Your Cyber Security Controls?

The changes to the Australian Privacy Act (22 Feb 2018) requires businesses report eligible data breaches.  Consequently, executives are asking how they can determine their preparedness and ensure they reduce the risk of potential fines. The Australian...

Read More

ASD Essential Eight – Multi Factor Authentication

The Australian Signals Directorate (ASD) published a list of prioritised cyber mitigation strategies in February 2017 that they claim will protect organisations against as many as 85% of targeted cyber-attacks. Known as the ASD Essential Eight, there...

Read More

ASD Essential Eight – The Perils of Java

The Australian Signals Directorate (ASD) published a useful list of prioritised cyber mitigation strategies in February 2017, known as the ASD Essential Eight.   User Application Security is one of the eight, including locking down and restricting...

Read More

ASD Essential Eight – Disable Office Macros

The Australian Signals Directorate (ASD) has published a useful list of prioritised cyber mitigation strategies since February 2017. Known as the ASD Essential Eight, there is little doubt in anyone’s mind that these controls reduce incidents. In this...

Read More
1 6 7 8 9