Security Centric

Recent Posts by Security Centric:

by Security Centric, on 30/09/2022 11:27:32 AM

The Optus PII breach has been the subject of many conversations the past week or so - at the technical level all the way through to advising boards on what …

Read Story
Topics:Red TeamingRisk AssessmentManaged Services

by Security Centric, on 24/03/2022 8:48:01 AM

News came to light recently from a threat actor group that authentication provider Okta had been compromised by one of their members. Okta later confirmed this, saying that an account …

Read Story
Topics:Threat Advisory

by Security Centric, on 03/03/2022 10:25:00 AM

Security Centric has announced the appointment of Sameh Girgis as Senior Security Consultant. Based in Sydney, Girgis will be responsible for reinforcing and propelling the company’s consulting and managed security …

Read Story
Topics:GovernanceManaged ServicesSecurity Centric

by Security Centric, on 06/01/2022 12:15:00 PM

Last month Security Centric principal consultant Sash Vasilevski provided his expertise to Business IT, outlining recommendations for cybersecurity uplift measures for small to medium enterprises. Throughout the article, an outline …

Read Story

by Security Centric, on 04/01/2022 12:15:00 PM

In the many years that Security Centric has been partnering with organisations to provide services ranging from compliance, penetration testing, and security engineering through to managed security services such as …

Read Story

by Security Centric, on 30/12/2021 1:00:00 PM

With the IT security landscape constantly evolving, many businesses struggle to find and retain people with the knowledge and skills required to counter threats. Last month, Security Centric's Sash Vasilevski …

Read Story
Topics:FundamentalsfeaturedManaged Services

by Security Centric, on 28/12/2021 11:17:00 AM

Earlier this month Security Centric's Sash Vasilevski provided expert opinion to the team at iTWire on the ins and outs of implementing zero trust as an outcome of the ongoing …

Read Story
Topics:Risk Assessment

by Security Centric, on 11/12/2021 3:25:30 PM

A new remote code execution vulnerability has been discovered affecting a common software library used in many systems and applications. A Java library, log4j2, is widely used in embedded systems …

Read Story
Topics:Threat Advisory

by Security Centric, on 22/12/2020 11:35:07 AM

There's no doubt that 2020 has created some unique challenges across every organisation, and since information security touches on arguably each of them, it also created some challenges for cyber …

Read Story
Topics:featured

by Security Centric, on 10/09/2020 11:17:42 AM

For many businesses who transact online, the holiday season brings with it an increased spend from consumers. For some, it’s their peak earning point of the year. Unfortunately, this increase …

Read Story
Topics:PentestingPenetration Test

by Security Centric, on 17/03/2020 1:59:39 PM

The handy folk at Sumo Logic, behind the multipurpose security analytics tool, have used published data to present and dissect near real time data of COVID-19 spread. Data is broken …

Read Story

by Security Centric, on 22/11/2018 8:11:09 PM

There is no one size fits all when it comes to cyber security – you cannot uncover your potential risks purely through comparison to another business. That’s where risk profiles …

Read Story
Topics:Risk Assessment

by Security Centric, on 17/10/2018 7:30:00 AM

Cyber security is a comprehensive multi-faceted approach to identifying, understanding, and then mitigating risks to information systems. In the past cyber security has largely been seen as a technology issue, …

Read Story
Topics:Risk Assessment

by Security Centric, on 26/05/2015 9:40:00 AM

The recent compromise and subsequent theft of personal information from eBay has reinforced one aspect of any mature information security approach – adequate application of defence in depth. The fact …

Read Story

Finally, an actionable blog

The purpose of this blog is to make available the real-world lessons, experience, observations and mistakes that are part of the daily life of a group of cyber security professionals.

Read about:

  • What mistakes organisations are making (anonymously of course!)
  • What effective actions are available to quickly and economically achieve effective protection (without buying new kit)
  • Trends we're seeing, via our incident response and forensic investigation capabilities
  • And sometimes, just frustrations about what is wrong with cyber :|

Subscribe to Updates