At a period in time when margins for traditional telco services continue to erode, Telecom leaders have looked to non-traditional solutions to supplem...
Protecting Critical Infrastructure Against Cyber Attacks
Australians have been told to conserve energy in the last few weeks as we face potential blackouts. This raises the question – how does a resource-r...
Internal Penetration Testing
What is internal penetration testing? Internal penetration testing is a process where a company typically hires an outside organisation to test the se...
Firewall Security Assessments
What is a firewall? A firewall is a physical or virtual appliance that filters network traffic between two or more networks. Firewalls can be used to ...
External Penetration Testing
What is external penetration testing? External penetration testing is a process of testing a computer system or network from the outside, by simulatin...
World Events, State Actors and Cyber Risk?
Download this article as a PDF Often business becomes complacent to the risks of cyberwarfare. With the saturation of these events in the media, it is...
Cyber Security In Maritime
The rapid digitalisation of the maritime industry is transforming how this industry operates. However, of concern is that with all the many benefits d...
Privacy Awareness Week 2021 – #PAW2021
This week is Privacy Awareness Week – a global initiative, supported by the Australian Information & Privacy Commission.While most Australi...
How to Address the SIGRed DNS Sever Cybersecurity Threat
Since WANNACRY AND NotPetya, security researchers have heavily scrutinised new Windows bugs that could be potentially be used to create a similar worm...
State sponsored attacks…..what you should know
The Morrison Government today raised the issue of state sponsored attacks against Australian companies and critical infrastructure and immediately the...