Insight Search

Sort by:
  • Whitepaper

    February 21, 2023
    This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Blogs

    June 30, 2023
    Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll Tide vs. War Eagle, The Egg Bowl, Bedlam, The Backyard Brawl, “The Game”). But we’re fundamentally not all that…
  • Blogs

    June 30, 2023
    We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is difficult to know where to begin. Security practitioners must constantly question what data they collect and why. Only by providing relevant measures can we…
  • Flash Report

    November 16, 2023
    The results from the recent ASIC cyber security survey, ‘REP 776 Spotlight on cyber: Findings and insights from the cyber pulse survey 2023,’ released on 13 November 2023, have once again highlighted the security posture of corporate Australia’s management of cyber security. While there were some encouraging trends in specific security capabilities around identity and access management,…
  • Blogs

    September 27, 2023
    By 2025, core banking workload deployment on cloud is expected to be 14% of total IT spend.Banks are grappling with outdated applications; data is siloed and trapped within legacy systems and not accessible for customer insights and tailored experiences and services.Regulatory changes in Australia, the UK and U.S., in GDPR and APRA standards for data privacy and operational resiliency, are also…
  • Blogs

    November 3, 2023
    Cybersecurity is distinguished not only by a talent shortage but also by having a predominantly male workforce. Women are in the minority on most cybersecurity teams that have women at all, so when they experience gender bias, they’re likely to be isolated.
  • Flash Report

    May 14, 2021
    On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private sectors,…
  • Whitepaper

    January 20, 2023
    Three years on from announcing it would be undertaking a review to “consider whether the scope of the Privacy Act 1988 and its enforcement mechanisms remain fit for purpose”, and a full year after its initial target completion date, the Attorney-General’s Department has completed its review and prepared the final report.
  • Blogs

    May 5, 2023
    Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down into…
Loading...