Want to know where to start and how best to implement a Cyber program. Start here. Our consultants are some of the world's most experienced and knowledgeable and are adept at translating technical language to real world so your business leaders and your organisation can benefit
The Cyber Assurance Risk Rating (CARR) is the de facto Australian standard for assessing cyber security business risk, when reviewing business relationships with third party suppliers. CARR provides a global, regional and local view of an organisation’s risk profile and the likelihood of a data breach via third party suppliers.
Cyber research shows that over 75% of cyber attacks worldwide originate from a malicious email, and the number of those targeted attacks keep increasing. As we have seen in the past, both very high-profile cyber campaigns as well as less known ones, are launched with an email containing a malicious attachment or link for infecting the victims with ransomware or opening a direct connection with the Command & Control (C&C) servers of the hackers.
A new service from Australian cyber research and consultancy firm Security in Depth aims to help enterprises minimise risk through a new ‘credit score’-style rating that assesses the security maturity of suppliers that integrate with their systems.
The new service is essentially “a cyber credit score,” CEO Michael Connory told Computerworld.
Crystal ball gazing is an art usually left to mediums and psychics who profit off the hope of the true believers.
It’s the ability to sell a belief that makes what a medium has to say an interesting story, and yet, there is something to be said about forecasting events with credibility and foresight while armed with the right information.
A new service rates businesses in supply chains on their security measures and the potential risk of doing business
A new service has been launched to give indicators to enterprises of whether or not their supply chain partners could be susceptible to cyberattacks.
The security of businesses is only as strong as its weakest link. Threat actors understand this and will often target employees via phishing campaigns, malicious links, and fraudulent websites in order to steal credentials and infiltrate a corporate network.