Business Email Compromise BEC Attacks

What you need to know about Business Email Compromise (BEC) attacks

Business Email Compromise (BEC) attacks are increasing at an alarming rate and look set to continue as a favoured method of cyberattack in the future. In this blog article, Shearwater’s social engineering and phishing expert, Damian Grace, provides guidance on what you can do TODAY to reduce your organisation’s risk. In a concerning trend, Australia […]

IRAP Frequently Asked Questions

IRAP Frequently Asked Questions

What is IRAP? The Information Security Registered Assessors Program (IRAP) is an initiative of the Australian Signals Directorate (ASD) through the Australian Cyber Security Centre (ACSC) to ensure the standard of cybersecurity and information security assessments for Information and Communications Technology (ICT) systems that process or store government information. A certified IRAP Assessor’s role is […]

Manage a Security Data Breach

The 5 most important things to consider during a data breach

Notifiable Data Breach Learning that you have experienced a data breach is an uncomfortable moment in any person’s life. Especially if you are a cyber security professional charged with keeping information safe and secure. More so if a third party tells you that you have seemingly lost information. Unfortunately, any day involving a data breach […]

Notifiable Data Breach

5 things to help you prepare for the Notifiable Data Breach scheme

Following on from my last post that covered the 5 things you need to know about the Notifiable Data Breach (NDB) scheme, this post is focused on the 5 things you really must do, in order to be prepared for the Notifiable Data Breach scheme. As you will remember the NDB impacts a significant number […]

Data Breach Notification

The 5 things you need to know about the Notifiable Data Breach scheme

Mandatory Data Breach Disclosure and the Notifiable Data Breach (NDB) scheme are both really hot topics at the moment. There is a number of experts from the legal, cyber security and business community all providing their advice, many providing guidance in forensic detail on what should be done to prepare an organisation for this change. […]

December Security Report

Information Security Report – December 2017

Over the past month, we have seen a number of threats, vulnerabilities, and spear phishing attacks affecting organisations worldwide. Read on for a summary of these events to help you assess their implication on your environment. Threats and Exploits Mailsploit Mailsploit Allows Spoofed Mails to Fool DMARC. Mailsploit is a collection of vulnerabilities in various […]

Vulnerability Management

How to set up the right Vulnerability Management processes

Managing your network vulnerabilities and identifying the right vulnerability management processes can be complex. Whilst finding and prioritising vulnerabilities are the responsibility of the security leader, the speed at which these vulnerabilities are remediated is dependent on other people in your organisation. System architects and administrators, IT managers and system owners all play a part […]

things you should know about ISO/IEC 27001

Ten things you should know about ISO/IEC 27001

1.    What is ISO 27001? ISO 27001 is an international standard for information security management. 2.    Why is ISO 27001 important to me? Information is the lifeblood of most contemporary organisations’. It provides intelligence, commercial advantage and future plans that drive success. Most Organisation store these highly prized information assets  electronically. Therefore, protection of these […]

What should I look for in a Threat Intelligence Solution?

This blog article is part of a series: Part 1 | Part 2 | Part 3 In this final article in this series, I provide some guidance on what to look for in a CTI solution. The four important questions when assessing CTI should be: How current is the Threat Intelligence Provided? How broad is […]

ASD Essential 8 Summary

ASD Essential 8 Summary

So you have mastered the ASD Top 4? What do you need to tame the Essential 8?  In this ASD Essential 8 Summary, we will answer: What has stayed the same? What has changed? What that means? What do I need to do to achieve this baseline standard? When do I need to complete it […]

Is Cyber Threat Intelligence worth investing in?

This blog article is part of a series: Part 1 | Part 2 | Part 3 In this blog article, I am seeking to address the question of whether CTI is worth investing in. Many vendors of Web Proxies, SIEM solutions, IPS, Firewall, UTM’s and email filtering technologies already provide a threat feed. The question […]

Cyber Threat Intelligence

What business problem does Cyber Threat Intelligence (promise to) solve?

This blog article is part of a series: Part 1 | Part 2 | Part 3 The cyber industry is certainly excited by CTI, and I don’t want to make any predictions on whether the excitement will blow over any time soon. The Threat Intelligence approach, does provide some hope, yes hope, of lessening a […]