Information Security

Ivanti’s Australian CISO Survey: How the Pandemic Has Shifted CISO Priorities

The COVID-19 pandemic has forced organisations to shift to an Everywhere Workplace model of working. Today, IT infrastructures are everywhere, and distributed employees need access to corporate data wherever they work, on any device. As organisations around the world consider making remote work a permanent option for their employees moving forward, we wanted to understand […]

Ivanti’s Australian CISO Survey: How the Pandemic Has Shifted CISO Priorities Read More »

2021 Voice of the CISO report

2021: THE AFTERMATH OF A YEAR LIKE NO OTHER There’s no question that 2020 was a challenging year – for organizations and individuals alike. The pandemic placed an enormous strain on the global economy, and cybercriminals took advantage of this disruption to accelerate their nefarious activities. We were inundated with cyberattacks, both new and familiar,

2021 Voice of the CISO report Read More »

AusCERT2021

At AusCERT2021, dust off your playbooks as we focus on improving efficiencies and making security a more self-operating function within our organisations. Security Orchestration, Automation, and Response will see us SOARing with cyber. Experience 4-days packed with world-class tutorials and presentations delivered to you by speakers from around the globe. AusCERT2021 registration is now open.

AusCERT2021 Read More »

2020 Cyber Threatscape report

EXECUTIVE SUMMARY In the past year, security strategies and practices have been tested like no other. Rapidly accelerated digital transformations, opportunistic phishing campaigns, discontinuity of information security operations and financial constraints are creating the perfect storm in a COVID-19-disrupted world. CISOs who understand these challenges and can pivot their security approach can help their organizations

2020 Cyber Threatscape report Read More »

Risk Management Framework Online Training

NIST has released an updated Risk Management Framework for Systems and Organizations Introductory Course to reflect guidance from NIST Special Publication (SP) 800-37, Revision 2.  The RMF was developed by NIST to help organizations manage information security and privacy risks to and from Information Technology (IT) systems more easily, efficiently and effectively. This three hour

Risk Management Framework Online Training Read More »

Risk Management Framework for Information Systems and Organizations

Abstract This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; and continuous monitoring. The

Risk Management Framework for Information Systems and Organizations Read More »

Cybersecurity Framework Version 1.1 Manufacturing Profile

This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The “Manufacturing Profile” of the CSF can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices. This Manufacturing Profile provides a voluntary, risk-based approach for managing

Cybersecurity Framework Version 1.1 Manufacturing Profile Read More »

Cyber Threat Analysis: User-friendly loaders and crypters simplify intrusions and malware delivery

Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other open source intelligence (OSINT) sources to identify loaders and crypters that facilitate threat actor campaigns. This report expands upon findings addressed in the report “Automation and Commoditization in the Underground Economy,” following reports on database breaches and on checkers and

Cyber Threat Analysis: User-friendly loaders and crypters simplify intrusions and malware delivery Read More »