Category: Blog
Cracking the CVE Code: A Primer on Cyber Vulnerabilities & Exposures
When it comes to cybersecurity, the Common Vulnerabilities and Exposures (CVE) system, managed by MITRE Corporation, plays a vital role
Less Spend, More Security: Optimizing Your Cybersecurity Budget
IT teams often grapple with the delicate balancing act of dedicating enough resources to cybersecurity while not straining their budget.
Zero-Day Vulnerabilities Uncovered: Strategies for Protecting Your Business from the Unknown
Amidst an extensive range of cyber threats, zero-day vulnerabilities present
Outsmarting the Thief: Protecting Your Business from Identity Theft and Fraud
In a world where technology and innovation continue to redefine the way we live and work, the dark underbelly of cybercrime thrives, exploiting
Combatting Alert Fatigue in Cybersecurity Operations
In today’s ever-evolving threat landscape, cybersecurity professionals are the first line of defence against a wide array of cyberattacks. As technology
ChatGPT – 2023’s Biggest Security Threat?
You’re going to hear a lot about ChatGPT and other AI tools this year. The technology hit mainstream momentum very quickly over the
Phishing Tools Are More Sophisticated Than Ever; How To Think About Email Security In 2023
Caffeine could be like any other cloud-based email Internet service. It has three service pricing tiers – “Basic”, “Professional” and “Enterprise”
Our Cybersecurity Predictions For 2023 – Threats Will Be Bigger, Faster, And Higher Risk
Cybersecurity was already a board-level concern, but after several very high-profile breaches in the latter half of the year, it’s going to be an even
Are You Cyber Resilient? Measuring and Improving Your Cybersecurity Performance
According to the latest edition of Cisco’s annual Security Outcomes Report, 96 percent of surveyed executives have asserted that security resilience
Email Security Is Keeping Security Leads Awake At Night– What Can Be Done?
The challenge of email security is only getting worse. Data from Proofpoint in its recent State of the Phish 2023 report shows that 90 percent of security
Have You Got $1 Billion To Spare? If Not, You Need To be Doing More Around Data Privacy
Last year was a difficult year for data privacy and security in Australia. Several high profile, back-to-back data breaches left the majority of Australians
Why code review is core to your enterprise’s health, productivity, and competitive advantage
There are few things more core to the modern business than coding.
In the era of multi-cloud Information Technology, zero trust security is the only solution
As IT environments have evolved, so too have the security requirements. The traditional, perimeter-based approach to security is no longer
Most organisations suffer data leak via email – the case for email encryption has never been stronger
We’re sending more email than ever. Research shows that 85 per cent of employees are emailing more now that working remotely has become
Good Cyber Security Starts At Home- Here are some of the key strategic considerations
If you were to imagine that cybercrime was a nation, it would be the third largest economy, after the United States and China. It costs businesses
The Five types of Business Email Compromise (BEC) scams according to the FBI
Business Email Compromise (BEC) is a growing problem targeting organizations of all sizes across the world. It is a type of cybercrime scam in
Understanding what Penetration Testing is, when it is required and its benefits
Penetration Testing is a type of security testing used to find flaws in the system. This is done in order to take appropriate security measures
Security Awareness is key to Cybersecurity behaviour change- What it is and its benefits
Nowadays all our business activities are online. We work, communicate, and interact online, and our reliance on cyber security has increased
The rise of Artificial Intelligence and its impact on Cybersecurity products and services
We live in an increasingly digitised world. The security and safety of our data have become paramount. With so much at risk of cyberattacks
The best ways to protect your organisation against Business Email Compromise scams
How to protect against BEC attacks In the last post, we discussed the different types of BEC scams. Now we
Endpoint Security and its increasing importance in the age of remote work
What is it? Gartner defines an endpoint protection platform (EPP) as a solution used to “prevent file-based malware attacks, detect
Zero Trust is an Approach not a Technology Product- History, Principles and Types
Zero trust is a security model based on the premise that no one is blindly trusted and allowed to access
The five major Cybersecurity Trends to look out for in 2022
The ever-growing online nature of our lives presents opportunities for online attackers. This makes it important for us to be
Cutting through the jargon; why every security operation needs SIEM, SOC and MDR
IT security is filled with jargon, and that can make it obtuse at the best of times. However, there are three terms that are particularly worth understanding
The Australian Cyber Security Centre has issued an urgent advisory
It has said that organisations should act now and follow ACSC’s advice to improve their cyber security resilience in light of the heightened threat environment.