Skip to main content
recon augmentedarticles

Augmented security operations

There are, by some calculations, no less than 11 different types of tools used today by a majority of corporations in efforts to remain secure. On top of the now ubiquitous patch management processes, log management systems, security configuration management (SCM), and security information and…
Kyle
June 15, 2021
recon backupsarticles

Regular backups

Out of the Essential 8, Regular backups is the easiest to achieve as the technologies, tools and strategies for backup are well documented. If you are looking to tick off a box quickly and easily to show progression on your Essential 8 journey, this is…
Dan
April 20, 2021
recon risk minimisationarticles

Zero trust network

Zero Trust Networking is a architectural foundation that is based on access control across your network and minimising access across the board.
Dan
March 25, 2021
recon threat intelligencearticles

Threat Intelligence – worth and use

Businesses must be online today. Consumers and businesses need to be able to interact with your business quickly and efficiently… no one has the time to fill out the cheque book anymore. When you allow users to do business with you online, you expose your…
Kyle
July 15, 2020
recon SDN securityarticles

The day will come and mantras to live by.

Many years ago, I had the great pleasure of working with John De Haven. John passed away some years back, but his words of wisdom remain with me. John was officially a genius. A member of Mensa, he had experience in real life or death programming while…
Dan
June 19, 2020
recon lockarticles

Database security – complexity for simple information

Complexity for Simple information In the complex modern world of ICT, there is nothing that is more important to your business than the data that resides within it, whether it be a person’s name, date of birth or even their credit card details. The database…
Dan
June 5, 2020