Category: Blog

ALC’s Cyber Scholarship Program – A Community Support Initiative

  • Published on March 16, 2020
  • No comments

ALC is dedicated to supporting and advancing the Cyber Security Profession with industry leading certification training. ALC – Australia’s #1 Training Provider for Cyber Security. ALC shows its support for advancing cyber security training in Perth with a university that has an increasingly strong presence in cyber security. In 2018, in partnership with Edith Cowan […]

ASD scraps Cloud Security Certification Program – Now What?

  • Published on
  • No comments

The Australian Signals Directorate (ASD) announced this week that the Cloud Security Certification Programme (CSCP) is being scrapped, and references to both the CSCP and Certified Cloud Provider List (CCPL) are being removed from the Information Security Manual (ISM) and other publications. So, what does this mean for government agencies, businesses and individuals who rely […]

InfoSec Skilled Workforce Shortfall – Reality?

InfoSec
  • Published on November 13, 2019
  • No comments

I have been in the infosec sector for over three decades and have seen the rise and fall of demand for IT and security professionals on a number of occasions. Y2K, the dot com bust and the GFC did not help our industry. Currently, we are on an upward trend, delivering training across Australia, NZ, […]

What is the Office 365 Security & Compliance Centre?

  • Published on March 26, 2019
  • No comments

Believe it or not, Office 365 now contains 27 separate apps that are provided by Microsoft.   Many of these apps are provided with advanced security features.  Clearly managing these security features within each admin tool is a complex and onerous task.  So Microsoft have moved as much security as possible into the Office 365 Security […]

Cybersecurity as Code in Office 365

  • Published on April 9, 2018
  • No comments

Last week I was running a course in Auckland, where I demonstrated the Office 365 Security & Compliance Center. The great thing about this new tool, is that it is policy-based, interactive and extremely visual. What does that really mean?  You need to firstly determine the important information around your corporate security posture. Then you […]

Risk Management Using The Right Approach

  • Published on February 5, 2018
  • No comments

It was just last year that the Ponemon Institute and IBM announced startling global data breach statistics. According to the organisations, in the Cost of Data Breach Study: Global Analysis study, the average cost of a data breach grew 23 per cent from the same report in 2013. The COBIT 5 framework has long been seen […]

How Well Do You Know Cybersecurity?

  • Published on December 19, 2017
  • No comments

Cybersecurity. It can be an intimidating prospect to get your head around, especially when IT isn’t in your job description. However, digital infrastructure has quickly become the dominant foundation upon which businesses are operating. While the digital sphere offers countless advantages and opportunities, it also brings with it a new threats.

3 reasons why your IT department is not delivering true business value

  • Published on February 26, 2017
  • No comments

Is your organisation getting full business value from its IT department? Here are three common mistakes that many companies are making.

The Realistic TOR Hack of Mr. Robot

  • Published on July 22, 2016
  • No comments

With the second season of Mr. Robot recently released for TV on demand, we’re taking a look at one of the controversial hacks performed on the show. 

Government hacks highlight international security concerns

  • Published on June 24, 2016
  • No comments

Recent hacks have shown the value and vulnerabilities associated with data breaches. How is choosing the right framework the first step in security?