Blog

What Happens When a Company Experiences a Data Breach?

Over the past decade, we’ve seen an influx in data breaches. From high-profile cases like the 2017 Equifax breach that exposed the personal information of 147 million people to more recent cases like the 2019 Facebook breach that affected 533 million users, and now the Optus breach and Medicare breach. It’s clear that no company is safe from a data breach. But why do they occur? And how to avoid them? Let’s take a closer look.

read more
Steve McLaughlin, Core Sentinel: “social engineering attacks are getting much more sophisticated and are ever-increasing”

Psychological manipulation and deception are just some of the social engineering tactics used in state-sponsored psychological operations. Originally published at …

read more
Penetration Testing and Compliance

A penetration test can properly locate a leak, and should be seen as valuable than a mere compliance tick-box measure.

read more
Healthcare Cybersecurity – An Industry In The Crosshairs

The Healthcare sector is under pressure from cybercriminals. How can you better prepare your organisation?

read more
Penetration Testing for GDPR

Before we get into how penetration testing is required in order to meet GDPR compliance, let’s take a quick look …

read more
What is DMARC? And How to Configure it

Stop People Spoofing Email from Your Domain Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email-validation system designed to …

read more
Ransomware: Mitigating The Threat

I’ve been seeing a lot of posts that jump to conclusions that everyone would be safe from ransomware if they …

read more
Black Box vs. White Box Testing: Key Differences Every Organisation Should Know

In today’s high tech world, no one is truly immune from cyber crime. Whether you’re a big corporation, government entity, …

read more
How to Effectively Build Hacker Personas

A hacker, in digital technology, is a term referring to a person with a tremendously high level of skills in …

read more
Characteristics of a Good Penetration Tester

Penetration testers possess a curious mind and a hunger to know how systems work. While many technical people have a …

read more