Security

THE NEED FOR A DDI SOLUTION

…AND THE PROBLEM WITH RELYING ON MICROSOFT ALONE It’s an interesting problem that we are seeing time and time again. Companies (and I’m not talking small ones either) relying on Microsoft to be their IP Address Management tool or to … Read More

IDC 2022 Global DNS Threat Report

Securing Anywhere Networking DNS Security for Business Continuity and Resilience DNS has been the Achilles’ heel of the network since its creation, making it a target of choice for cybercriminals. These attacks exploit weaknesses, gain access to the network, and … Read More

DEVICE42 AND LOG4J ZERO-DAY

HOW DEVICE42 CAN HELP Device42’s discovery capability can help you identify systems vulnerable to the Log4j RCE the Log4j vulnerability is critical and impacts many applications and systems Device42’s software is not impacted by the Log4j vulnerability SUMMARY CertNZ revealed on … Read More

How can you troubleshoot your network issues and improve its security with a limited budget and a laptop?

Network issues and security problems can happen at any point, particularly when you are not prepared to respond appropriately and fast. To investigate these issues, you’ll need access to your network for 100% visibility of what is causing the problem. … Read More

CyberSeige with Spirent CyberFlood

This demo of the CyberFlood GUI creating attack traffic and emulating any country in the world is a powerful solution to not only tune perimeter devices but to also help train cyber teams to understand types of attack traffic. When … Read More

Transport Layer Security v1.3 Fuzz Testing

Improving security and robustness of Cloud, IoT, and Internet Services For over two decades, Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have been responsible for securing the communication in the network and between smart devices. The … Read More

Why would Europe’s General Data Protection Regulation (GDPR) Affect My Business?

In May 2018, the European Union’s (EU) General Data Protection Regulation (GDPR) will come into effect. It’s the most comprehensive piece of privacy legislation developed by any jurisdiction to date and goes way beyond the requirements of Australia’s current privacy … Read More

Why You Need to Test How Secure Your IoT Devices Are

By 2020 the number of Internet of Things (IoT) devices installed across the world will be more than twice the figure for 2017, according to analyst firm Gartner. There are already around 8.4 billion connected devices today and Gartner says … Read More

30 Days until Mandatory Data Breach Notification Becomes Law

Australia has recently enacted new legislation on the federal level to bring its data security practices in line with nations like the United States. This was initiated with the intent of streamlining international cooperation concerning data storage on a corporate … Read More

What’s the point of penetration testing?

With Australia’s recent introduction of a mandatory data breach notification regime, it’s more important than ever to invest in cyber security. If an organisation has grounds to believe that there has been an eligible data breach, it must notify customers … Read More