Recent Posts by Security Centric:
by Security Centric, on 30/09/2022 11:27:32 AM
The Optus PII breach has been the subject of many conversations the past week or so - at the technical level all the way through to advising boards on what …
Read Storyby Security Centric, on 24/03/2022 8:48:01 AM
News came to light recently from a threat actor group that authentication provider Okta had been compromised by one of their members. Okta later confirmed this, saying that an account …
Read Storyby Security Centric, on 03/03/2022 10:25:00 AM
Security Centric has announced the appointment of Sameh Girgis as Senior Security Consultant. Based in Sydney, Girgis will be responsible for reinforcing and propelling the company’s consulting and managed security …
Read Storyby Security Centric, on 06/01/2022 12:15:00 PM
Last month Security Centric principal consultant Sash Vasilevski provided his expertise to Business IT, outlining recommendations for cybersecurity uplift measures for small to medium enterprises. Throughout the article, an outline …
Read Storyby Security Centric, on 04/01/2022 12:15:00 PM
In the many years that Security Centric has been partnering with organisations to provide services ranging from compliance, penetration testing, and security engineering through to managed security services such as …
Read Storyby Security Centric, on 30/12/2021 1:00:00 PM
With the IT security landscape constantly evolving, many businesses struggle to find and retain people with the knowledge and skills required to counter threats. Last month, Security Centric's Sash Vasilevski …
Read Storyby Security Centric, on 28/12/2021 11:17:00 AM
Earlier this month Security Centric's Sash Vasilevski provided expert opinion to the team at iTWire on the ins and outs of implementing zero trust as an outcome of the ongoing …
Read Storyby Security Centric, on 11/12/2021 3:25:30 PM
A new remote code execution vulnerability has been discovered affecting a common software library used in many systems and applications. A Java library, log4j2, is widely used in embedded systems …
Read Storyby Security Centric, on 22/12/2020 11:35:07 AM
There's no doubt that 2020 has created some unique challenges across every organisation, and since information security touches on arguably each of them, it also created some challenges for cyber …
Read Storyby Security Centric, on 10/09/2020 11:17:42 AM
For many businesses who transact online, the holiday season brings with it an increased spend from consumers. For some, it’s their peak earning point of the year. Unfortunately, this increase …
Read Storyby Security Centric, on 17/03/2020 1:59:39 PM
The handy folk at Sumo Logic, behind the multipurpose security analytics tool, have used published data to present and dissect near real time data of COVID-19 spread. Data is broken …
Read Storyby Security Centric, on 22/11/2018 8:11:09 PM
There is no one size fits all when it comes to cyber security – you cannot uncover your potential risks purely through comparison to another business. That’s where risk profiles …
Read Storyby Security Centric, on 17/10/2018 7:30:00 AM
Cyber security is a comprehensive multi-faceted approach to identifying, understanding, and then mitigating risks to information systems. In the past cyber security has largely been seen as a technology issue, …
Read Storyby Security Centric, on 26/05/2015 9:40:00 AM
The recent compromise and subsequent theft of personal information from eBay has reinforced one aspect of any mature information security approach – adequate application of defence in depth. The fact …
Read StoryThe purpose of this blog is to make available the real-world lessons, experience, observations and mistakes that are part of the daily life of a group of cyber security professionals.
Read about:
Level 6, 227 Elizabeth St
Sydney, NSW 2000
Call us: +61 2 9199 0000