Our Blog & Updates

All articles

UPDATE: FireEye Red Team Security Evaluation Tools Stolen

10 Dec 2020

UPDATE: FireEye Red Team Security Evaluation Tools Stolen

UPDATE - SolarWinds Orion vulnerability being actively exploited - Earlier this week, FireEye publicly advised that a highly sophisticated state-sponsored actor had gained access to their network and have taken a copy of the FireEye Red Team tools.

Read more
Australian legal services provider recieves cyberattack

21 Nov 2020

Australian legal services provider recieves cyberattack

An Australian supplier to the legal services industry has suffered a cybersecurity incident.

Read more
Protecting Against Business Email Compromise (BEC)

01 Nov 2020

Protecting Against Business Email Compromise (BEC)

The Australian Cyber Security Centre (ACSC) has released a new publication – Protecting Against Business Email Compromise (BEC) – to help Australians defend against these deceptive and expensive scams.

Read more
Today's Hidden Costs & Risks of Using Monolithic Systems

30 Sep 2020

Today's Hidden Costs & Risks of Using Monolithic Systems

Research shows that 90% of companies around the world use monolithic systems and the reality is, they are running on borrowed time.

Read more
More manufacturing companies endure cyberattacks

11 Jun 2020

More manufacturing companies endure cyberattacks

Fisher and Paykel, and Honda, have been added to the ever-growing list of manufacturing companies to be hit by significant cyberattacks, resulting in hackers in getting their hands on sensitive information, and preventing businesses from being able to operate.

Read more
Consequences of Generate Kiwisaver data breach and learnings for other businesses

27 Feb 2020

Consequences of Generate Kiwisaver data breach and learnings for other businesses

Generate Kiwisaver recently had a data breach with 26,000 of their members affected.

Read more
Hardware asset inventory: A fundamental requirement for managing cyber-risk

28 Dec 2019

Hardware asset inventory: A fundamental requirement for managing cyber-risk

Hardware asset inventory is a fundamental requirement to manage cyber-risk. Getting started with this conversation is essential for all organisations.

Read more
Owners, Directors and Executives, are you confused about cyber risk and cybersecurity?

25 Aug 2019

Owners, Directors and Executives, are you confused about cyber risk and cybersecurity?

Directors and C-levels need to differentiate cyber risk management as a governance and management activity, on the same levels and finance risk management and health and safety risk management.

Read more
The 5 Personas Of Cyber Risk Management

25 Aug 2019

The 5 Personas Of Cyber Risk Management

Director advisory organisations from around the world have been singing from the same hymn sheet for several years – cyber risk is a key element to enterprise risk

Read more