Cyber

IDC 2022 Global DNS Threat Report

Securing Anywhere Networking DNS Security for Business Continuity and Resilience DNS has been the Achilles’ heel of the network since its creation, making it a target of choice for cybercriminals. These attacks exploit weaknesses, gain access to the network, and … Read More

CyberSeige with Spirent CyberFlood

This demo of the CyberFlood GUI creating attack traffic and emulating any country in the world is a powerful solution to not only tune perimeter devices but to also help train cyber teams to understand types of attack traffic. When … Read More

Transport Layer Security v1.3 Fuzz Testing

Improving security and robustness of Cloud, IoT, and Internet Services For over two decades, Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have been responsible for securing the communication in the network and between smart devices. The … Read More

Why would Europe’s General Data Protection Regulation (GDPR) Affect My Business?

In May 2018, the European Union’s (EU) General Data Protection Regulation (GDPR) will come into effect. It’s the most comprehensive piece of privacy legislation developed by any jurisdiction to date and goes way beyond the requirements of Australia’s current privacy … Read More

Why You Need to Test How Secure Your IoT Devices Are

By 2020 the number of Internet of Things (IoT) devices installed across the world will be more than twice the figure for 2017, according to analyst firm Gartner. There are already around 8.4 billion connected devices today and Gartner says … Read More

30 Days until Mandatory Data Breach Notification Becomes Law

Australia has recently enacted new legislation on the federal level to bring its data security practices in line with nations like the United States. This was initiated with the intent of streamlining international cooperation concerning data storage on a corporate … Read More

What’s the point of penetration testing?

With Australia’s recent introduction of a mandatory data breach notification regime, it’s more important than ever to invest in cyber security. If an organisation has grounds to believe that there has been an eligible data breach, it must notify customers … Read More