Skip to main content
articles

Understanding your options for email protection

Even as digital collaboration solutions have evolved, email has remained a prevalent communication channel, which also means cyber criminals continue attacking it. In 2023, 97% of organisations surveyed by Mimecast experienced email-based phishing attacks. These threats range from basic phishing attempts to more sophisticated schemes…
Dan Housden
February 28, 2024
articles

Can you afford not to invest in cyber resilience?

Plenty of people have written about the increasing costs of doing business. Many executives are focused solely on putting capital into one of two places: revenue-generating exercises or retained earnings to ensure their business can survive any forthcoming, widely expected recession. Financial backup and revenue…
Kyle Lange
November 22, 2023
What makes an organisation's cyber security mature?articles

What makes an organisation’s cyber security mature?

More boards and business leaders have focused their attention on cyber security initiatives in recent years. This is partially a result of increased reports on threats, including breaches that impacted some of Australia’s largest and most well-known companies. Leadership has also become responsible for understanding…
Dan Housden
October 30, 2023
articles

Unpacking NIST CSF 2.0: A renewed focus on governance

In recent years, I have witnessed the transition from cyber security as merely a role for the IT department to a subject raised in board-level discussions. Major breaches impacting the Australian public and people globally have forced executives to ask about the measures in place…
Kyle Lange
September 26, 2023
What should Australian CISOs care about in FY2024?articles

What should Australian CISOs care about in FY2024?

The role of Australian CISOs has undergone significant change in recent years. Where you once were responsible for delivering and managing cyber security tools to complement the work done by your CIO, you are now responsible for managing the entire organisation’s risk profile and providing…
Dan Housden
August 30, 2023
recon augmentedarticles

Augmented security operations

There are, by some calculations, no less than 11 different types of tools used today by a majority of corporations in efforts to remain secure. On top of the now ubiquitous patch management processes, log management systems, security configuration management (SCM), and security information and…
Kyle Lange
June 15, 2021
recon backupsarticles

Regular backups

Out of the Essential 8, Regular backups is the easiest to achieve as the technologies, tools and strategies for backup are well documented. If you are looking to tick off a box quickly and easily to show progression on your Essential 8 journey, this is…
Dan Housden
April 20, 2021
recon risk minimisationarticles

Zero trust network

Zero Trust Networking is a architectural foundation that is based on access control across your network and minimising access across the board.
Dan Housden
March 25, 2021
recon threat intelligencearticles

Threat Intelligence – worth and use

Businesses must be online today. Consumers and businesses need to be able to interact with your business quickly and efficiently… no one has the time to fill out the cheque book anymore. When you allow users to do business with you online, you expose your…
Kyle Lange
July 15, 2020
recon SDN securityarticles

The day will come and mantras to live by.

Many years ago, I had the great pleasure of working with John De Haven. John passed away some years back, but his words of wisdom remain with me. John was officially a genius. A member of Mensa, he had experience in real life or death programming while…
Dan Housden
June 19, 2020