Author: Ibrahim Sukari

Vulnerability scanning vs penetration testing

In the evolving world of cyber security, IT systems constantly face new threats. The Australian Cyber Security Centre reports that in Australia, a cybercrime is reported approximately every 10 minutes. A breach can heavily impact operations and cost valuable time and money. To stay secure, organisations need to test…

Continue Reading

Ransomware in Australia: What you need to know

Ransomware is a huge problem for businesses across the world, and Australia’s no exception. Below, we break down everything you should know about this emerging threat, and how to keep your data safe.

Ransomware Attack Trends

Ransomware is a type of malware hackers use to scramble your files…

Continue Reading

How to keep your business cyber safe during the holidays

The holidays are a time of great excitement, not only for you and yours, but also for hackers and cybercriminals. They know that with all the shopping and preparation everyone is doing, people may be less diligent with their cybersecurity. Here are some important things to do to keep you cyber safe this holiday season and beyond…

Continue Reading

54,000 NSW driver licences leaked in AWS cloud: But, there’s hope on the horizon

Cyber Security NSW recently informed Transport for NSW that a cloud storage folder containing personal information, including approximately 54,000 NSW driver licences, were left open in a misconfigured Amazon Web Services (AWS) S3 bucket hosted by Amazon’s cloud service…

Continue Reading

Dark web monitoring: Going dark in Australian workplaces

While there are numerous positive and beneficial aspects of the dark web, it has become a well-known global market place where bad actors in the workplace can commit cybercrimes almost undetected. Fortunately, the advent of new and emerging technologies enable us to monitor dark web and potentially derail cybercriminals…

Continue Reading

DevSecOps: Leading the way to a breach-free business

There will always be security threats; malware or other. To avoid damaging your customer’s systems and your reputation, always factor-in security, parallel with your development and operations. If your business includes the development and distribution of applications, moving to a DevSecOps mechanism is especially relevant…

Continue Reading

What is SIEM (Security Information and Event Management)?

Security Information and Event Management (SIEM) is a key component of today’s cybersecurity landscape. Driven by the escalating threat of data breaches and their severe repercussions, more organisations are using SIEM platforms to track and investigate cyberattacks. Basically, if a company gets hacked…

Continue Reading
Scroll to top