Why Vulnerability Management is Better as a Service
Many things in IT are set and forget, you install a new application, you implement a new network or roll out new visibility system. Sure, these things need to be maintained over time, but the main effort is at implementation time after which point you (hopefully)...
Central West Man Inherits Fortune from Nigerian Prince
(A Light Hearted Look at Phishing) West Wyalong man Wazza Whiting is in a celebratory mood tonight after announcing the inheritance of $10 million dollars from a recently deceased member of the Nigerian Royal Family. It was cold VB's all round at the Crooked Mile RSL...
Cyber security company stuns industry with advertisement that doesn’t feature a hacker in a hoodie.
Industry pundits are astounded with an advertisement placed by a top flight cyber security company that doesn’t feature a hacker in a hoodie in a dark room. Even more surprising is the total break from traditional techniques with no pad locks, no screens of code, no...
TLSv1.3 – The Good, The Bad and The Ugly
A new version of Transport Layer Security (TLS) is coming… welcome TLS1.3! Well to be fair it is already here and has been for over 12 months, but as is the case with many Internet standards, adoption is taking some time. And for those not fully across exactly what...
The Truth About Passwords
Anyone who hasn’t been living off the grid for the last 30 years will know the pain of having to manage numerous complex passwords every day in order to work, shop and socialise in our online world. Most of us take it for granted that this is part of the price...