by Security Centric, on 24/03/2022 8:48:01 AM

News came to light recently from a threat actor group that authentication provider Okta had been compromised by one of their members. Okta later confirmed this, saying that an account …

Read Story
Topics:Threat Advisory

by Alex W, on 22/03/2022 9:55:37 AM

As security teams assess the key vulnerabilities of their IT infrastructures, growing attention is being placed on cyber supply chains. Attacks, such as the high-profile SolarWinds incident, occur when cybercriminals …

Read Story
Topics:Risk AssessmentComplianceEssential Eight

Finally, an actionable blog

The purpose of this blog is to make available the real-world lessons, experience, observations and mistakes that are part of the daily life of a group of cyber security professionals.

Read about:

  • What mistakes organisations are making (anonymously of course!)
  • What effective actions are available to quickly and economically achieve effective protection (without buying new kit)
  • Trends we're seeing, via our incident response and forensic investigation capabilities
  • And sometimes, just frustrations about what is wrong with cyber :|

Subscribe to Updates