Securing Anywhere Networking DNS Security for Business Continuity and Resilience DNS has been the Achilles’ heel of the network since its creation, making it a target of choice for cybercriminals. These attacks exploit weaknesses, gain access to the network, and … Read More
Cyber
CyberSeige with Spirent CyberFlood
This demo of the CyberFlood GUI creating attack traffic and emulating any country in the world is a powerful solution to not only tune perimeter devices but to also help train cyber teams to understand types of attack traffic. When … Read More
Transport Layer Security v1.3 Fuzz Testing
Improving security and robustness of Cloud, IoT, and Internet Services For over two decades, Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have been responsible for securing the communication in the network and between smart devices. The … Read More
Why would Europe’s General Data Protection Regulation (GDPR) Affect My Business?
In May 2018, the European Union’s (EU) General Data Protection Regulation (GDPR) will come into effect. It’s the most comprehensive piece of privacy legislation developed by any jurisdiction to date and goes way beyond the requirements of Australia’s current privacy … Read More
Why You Need to Test How Secure Your IoT Devices Are
By 2020 the number of Internet of Things (IoT) devices installed across the world will be more than twice the figure for 2017, according to analyst firm Gartner. There are already around 8.4 billion connected devices today and Gartner says … Read More
30 Days until Mandatory Data Breach Notification Becomes Law
Australia has recently enacted new legislation on the federal level to bring its data security practices in line with nations like the United States. This was initiated with the intent of streamlining international cooperation concerning data storage on a corporate … Read More
What’s the point of penetration testing?
With Australia’s recent introduction of a mandatory data breach notification regime, it’s more important than ever to invest in cyber security. If an organisation has grounds to believe that there has been an eligible data breach, it must notify customers … Read More