Latest Posts
Chinese State-Sponsored Cyber Attacks
What Do Advanced Cyber Attacks Look Like? Cybersecurity is an ever-evolving battlefield, with state-sponsored attacks becoming increasingly sophisticated. The Australian Cyber Security Centre in conjunction
Supplier Due Diligence: An Introductory Guide
In today’s digital age, organisations are more interconnected than ever, relying heavily on suppliers and third-party vendors to provide essential services and products. While this
MFA Fatigue: The Shift to Phishing-Resistant Authentication
MFA Fatigue The Shift to Phishing Resistant Authentication It’s long been widely known that in the real world passwords alone are not a great way
No-Defender can deactivate windows defender
Last week a new tool was brought to my attention, No-Defender, a tool published on GitHub that can deactivate Windows Defender by exploiting the Windows
Defend Train our Comprehensive Training Solution
Maintaining robust cybersecurity is crucial in today’s digital age. As cyber threats become more sophisticated, continuous cyber awareness training for employees is essential. Training employees
Evidence-Based Security Practices
Expansive compliance frameworks listing hundreds of security measures can be found in may places, from the likes of NIST, ISO and CIS. While great for defining what “good” looks like – which controls give you the most risk
Decoding Cloud Security and Pentests for SME CEOs
In today’s digital landscape, where businesses increasingly rely on cloud services, ensuring the security of your data and systems is paramount.
Unlocking the Power of MFA
Let’s face it, dealing with Multi-Factor Authentication (MFA) can sometimes feel like an inconvenience. But before you dismiss it as a hassle, consider this:
How to stay ahead of Cybercriminals
Welcome to the wild world of emails—a playground where cybercriminals roam freely, preying on unsuspecting victims with cunning tactics