Entries by Eli Oshorov

FAQ: Consumer Data Rights (CDR)

With regular reports of data breaches, information security and privacy protection are increasingly important concerns for many Australian consumers. Implementing rigorous data protection measures can be a good corporate differentiator – setting your business apart from the competition by giving your customers the confidence their confidential personal and financial information is secure. Another important driver […]

Know Everything About Password Security? It’s Time for a Rethink

As organisations continue to struggle with the issue of password security, many of the old assumptions are being re-examined. If you make one cybersecurity-related resolution this New Year, commit to re-thinking your organisation’s password controls by considering some of the latest advice. Passwords are the front line in your battle against cyber-attacks. Hackers rely on […]

Gamification: Making cybersecurity awareness and professional development engaging

The cybersecurity threat landscape is constantly evolving. New attack vectors emerge weekly. This necessitates the adoption of strategies to engage and upskill teams on an ongoing basis. Whether it’s raising general awareness about cybersecurity among your staff, or specific professional development training for your IT and development teams, there are many ways you can incorporate […]

Introducing Margueritte Saboungi: Winner of the Katie Duczmal Memorial Scholarship

Margueritte Saboungi, a 3rd year student at Western Sydney University, is the inaugural recipient of Shearwater Solution’s Katie Duczmal Memorial Scholarship. The scholarship is the centrepiece of Shearwater’s commitment to encourage greater female participation in the cybersecurity industry. As one of two female students in the initial cohort undertaking the Bachelor of Cyber Security and […]

Developing Secure Apps

Developing secure apps starts with ensuring your code is secure Perhaps you need to develop a new e-commerce platform. Perhaps you’re considering a new customer portal. Or perhaps your organisation needs to be able to transmit high volumes of data securely. Whatever the reason, when it comes time to develop or upgrade your organisation’s web […]

Unauthenticated vs Authenticated Penetration Testing. What’s right for you?

Fort Knox, home to America’s gold bullion reserves, is synonymous with impenetrability. Despite formidable and multi-layered defensive measures, could an attacker still identify security gaps and penetrate the perimeter? Regularly checking perimeter defences can help identify potential vulnerabilities. Conducting assessments from the outside, like an attacker without access credentials, is an Unauthenticated test. But what […]

Skills Shortage Demands Fresh Thinking

With cybersecurity strategies constrained by staffing challenges, Managed Security Services helps your organisation stay safe. After investing many valuable hours training your cybersecurity team, few things are as frustrating as seeing staff up and leave to pursue job opportunities elsewhere. Yet, as IT Managers and cybersecurity leaders across Australia will attest, retaining top quality tech […]