CS Energy Breach
Read More: CS Energy BreachCS Energy in Queensland, Australia recently made the headlines when a breach was detected and thwarted before any harm was done to their customers. I want to congratulate the response from CS Energy’s cyber security team, they clearly detected and responded to a potentially catastrophic situation in a controlled and timely manner, great work! This…
55% of kiwi businesses fall “victim”
Read More: 55% of kiwi businesses fall “victim”I still hate statistics especially when those stats point to something that is so blatantly “not true”! 55% of kiwi businesses fell “victim” to a ransomware attack? How about a more accurate statistic (sorry), 100% of Kiwi businesses received a ransomware loaded email…. even one ransomware loaded email per day! both are pointless and yet…
Statistics, Lies and Automobiles
Read More: Statistics, Lies and AutomobilesI have a new goal for 2022 and beyond, no more stats! I promise to stop using statistics, statistics are the cyber security industries fear mongering tactic, you must do something about x because 78% of your industry peers are worried about the risk of x; this is most often not relevant, disingenuous and “over…
Worst Case, it is not!
Read More: Worst Case, it is not!example on Sunday there is a 50% chance of rain as forecast today. So I have to plan for the possibility that it is going to rain as 50% likely or unlikely (depending on my feelings of positivity for the day).
Zero trust buzzword bingo
Read More: Zero trust buzzword bingoDescribing a host of solutions and practises that are already in-place for experienced security teams and being considered by the many not so experienced security teams looking for guidance, ZTNA is not a one size fits all and the marketing around ZTNA does make this any clearer for business.
Journey starts here!
Read More: Journey starts here!And not the ol’ Playstation game Start today, if you have not already begun your cyber security planning. If you do not have the expertise then use your trusted reseller and regardless of your reseller, use the resources available with the ACSC – this is priceless (and free) for beginners. https://www.cyber.gov.au Please do not do…
It all adds up!
Read More: It all adds up!I had no idea at all! over 100 notifiable and probable “State Based” significant hacks to October 2021 – either against government orgs or with a value of more than $1 million. Four of those were against Australian government orgs and one against a New Zealand Government org. One of our business partner orgs who…
Board level: concepts and explanations
Read More: Board level: concepts and explanationsHave you ever “lost” you audience when presenting a solution to your board of directors? no matter how hard you try to explain why your company needs this cyber security widget or process, they do not understand “your” urgency nor accept what you are explaining? Try this at home when you are passionate about a…
phonespy: Mobile app targeting South Korean citizens
Read More: phonespy: Mobile app targeting South Korean citizensWorrying trend in that criminals are using mobile apps to steal data from our devices. PhoneSpy only affects Android and is not an Android Playstore app, rather it is side loaded via web traffic redirection or social engineering. PhoneSpy is able to access personal images, videos, phone logs, stored data, as well as taking photos…
Zero Trust vendor architecture: Ethical, or not ethical?
Read More: Zero Trust vendor architecture: Ethical, or not ethical?A vulnerability is disclosed in Palo Alto VPN hardware/software, the company who discovered this: Randori may not have disclosed this to the vendor in a timely fashion. The premise that is suggested for this, is that as Randori are a Red Teaming company they used this Vulnerability to infiltrate their clients who used Palo Alto…