Blog

Penetration Testing Australia: Meeting Client Security Expectations and Excelling in Vendor Selection

At Core Sentinel, our penetration testing Australia services are designed to meet your vendor’s expectations during selection process, to demonstrate your security commitment.

read more
Core Sentinel: Australia’s Premier Web Application Penetration Testing for SMEs

At Core Sentinel, we deliver web application penetration testing tailored for SMEs, ensuring your business stays safe. With thousands of tests completed and a team of Australia’s most qualified experts, we’re the trusted choice for penetration testing in Australia.

read more
AI, Security, and Penetration Testing

Penetration testing in Australia is critical for securing AI systems and how Core Sentinel delivers unmatched expertise to keep your digital assets safe.

read more
What Happens When a Company Experiences a Data Breach?

Over the past decade, we’ve seen an influx in data breaches. From high-profile cases like the 2017 Equifax breach that exposed the personal information of 147 million people to more recent cases like the 2019 Facebook breach that affected 533 million users, and now the Optus breach and Medicare breach. It’s clear that no company is safe from a data breach. But why do they occur? And how to avoid them? Let’s take a closer look.

read more
Steve McLaughlin, Core Sentinel: social engineering attacks are getting much more sophisticated and are ever-increasing

Psychological manipulation and deception are just some of the social engineering tactics used in state-sponsored psychological operations. Originally published at …

read more
Penetration Testing and Compliance

A penetration test can properly locate a leak, and should be seen as valuable than a mere compliance tick-box measure.

read more
Healthcare Cybersecurity – An Industry In The Crosshairs

The Healthcare sector is under pressure from cybercriminals. How can you better prepare your organisation?

read more
Penetration Testing for GDPR

Before we get into how penetration testing is required in order to meet GDPR compliance, let’s take a quick look …

read more
What is DMARC? And How to Configure it

Stop People Spoofing Email from Your Domain Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email-validation system designed to …

read more
Ransomware: Mitigating The Threat

I’ve been seeing a lot of posts that jump to conclusions that everyone would be safe from ransomware if they …

read more