Don’t be fooled! Vulnerability Scanning vs Penetration Testing
Businesses must take proactive measures to safeguard the sensitive data they hold and ensure the resilience of their information security infrastructure, especially to known active
Businesses must take proactive measures to safeguard the sensitive data they hold and ensure the resilience of their information security infrastructure, especially to known active
Although it is not always obvious, Artificial intelligence (AI) is quickly becoming a part of everyday life. And for those organisations who implement AI, it
What are A.I Chatbots? A.I chatbots are software that utilise text-to-text and text-to-speech to simulate conversation with a real human. These are typically used on
Organisations that have experienced a data breach in recent times will confirm that it is a traumatic. It is an unpleasant experience for the board,
As the second largest telecommunications provider in Australia with around 10 million customers (individuals, companies and public sector organisations), it will come as no surprise
In 2021, the Australia Prudential Regulation Authority (APRA) started writing to financial service institutions to instruct them to engage an independent auditor/expert to undertake a
The South Australian Government (SA Gov) have been affected by a data breach of over 80,000 staff enrolled in their payroll system provided by Frontier
Penetration testing is one of many tools available to organisations to evaluate the effectiveness of their layers of cyber controls. Organisations have always been exposed
With more people working from home in response to the pandemic, a shift to a decentralised hybrid workforce model, 5G network expansion, more connected devices,
Organisations rely on third party vendors to complete their supply chain ecosystem as a means of cutting cost and saving time. Why reinvent the wheel