Blog

Picture of a laptop computer with a background view of a high-rise city landscape

Cloud Data Breaches

Years ago, a breach that compromised the data of a few million people would have been few and far between.…

Read more

What is DevSecOps?

What is DevSecOps? Let’s break it down. “DevSecOps is actually a combination of three disciplines. Development, Security and Operations.”  Back…

Read more

IoT Security

IoT Security – Subject of research and concern   In late 2019, Security experts from CheckPoint uncovered a security flaw…

Read more

What is the Essential 8 ?

The Australian Cyber Security Centre (ACSC) developed the Essential Eight Maturity Model, known widely as the Essential 8. The ACSC…

Read more

Is your MacOS Safe?

Macs are safer, but… We often hear that Mac users are less likely to be targeted by cybercriminals. This statement…

Read more

SOAR -ing with TheHive

Introduction SOAR stands for Security Orchestration, Automation and Response, referring to a solution that is used in the threat landscape…

Read more

We are cyber security, data services and technology solution specialists

Let’s talk about how we can help

Technical Documentation

Elastic SIEM

Security is everyone’s responsibility. However, the tools of yesterday can’t keep up with today’s challenges. Blind spots are the enemy, and the attack surface is

Read More