Contact Us
Menu
Contact Us

by Sash, on 16/07/2020 4:54:49 PM

Background The public figure Twitter account hijacking extends well past social media and has many parallels to business and enterprise systems. Whenever there is a breach, it should be review …

Read Story
Topics:InsiderFundamentals

by Tim, on 14/12/2018 12:22:00 PM

In Part 2, the importance of a well-maintained and well-structured hardware and software inventory and the benefits of vulnerability management was explained. The next step in the process of getting …

Read Story
Topics:InsiderFundamentalsAuthentication

by Nigel, on 03/12/2018 12:56:00 PM

What Brush Turkeys Have Taught Me About Information Security It is that time of year again when a male brush turkey has made my backyard his home, tearing apart vegetation …

Read Story
Topics:InsiderGovernanceRed TeamingRisk Assessment

by Eddie, on 29/11/2018 3:02:00 PM

As information security has become more important across organisations, so has the role of an information security leader within organisations. As an information security leader in an organisation, several questions …

Read Story
Topics:InsiderPentestingRed TeamingPhishing

Finally, an actionable blog

The purpose of this blog is to make available the real-world lessons, experience, observations and mistakes that are part of the daily life of a group of cyber security professionals.

Read about:

  • What mistakes organisations are making (anonymously of course!)
  • What effective actions are available to quickly and economically achieve effective protection (without buying new kit)
  • Trends we're seeing, via our incident response and forensic investigation capabilities
  • And sometimes, just frustrations about what is wrong with cyber :|

Subscribe to Updates