Archives For 2023.
Macquarie announces general meeting to change its name to Macquarie Technology Group Limited
|Macquarie Technology Group (ASX: MAQ) today announced that it intends to change its listed company name to Macquarie Technology Group, reflecting the company’...
Azure infrastructure management: Best practices (and how to implement them).
|As a user of Microsoft Azure, you don’t need to know every detail about managing your cloud infrastructure to get the best possible outcomes (if you have the right partner supporting you – more on that a bit later). However, if you know nothing e...
Three best practices for managing your Azure cost.
|It’s a common misconception that cloud environments such as Microsoft Azure are always more cost-effective than their on-premise or private cloud counterparts. After all, you’re eliminating the heavy expenditure associated with hardware, hypervis...
Foundational Considerations for Securing Your Azure Environment
|How to secure your Microsoft Azure environment At Macquarie Cloud Services, our appreciation for Microsoft Azure runs deep, driven by a multitude of compelling factors. Its capabilities provide a seamless and cost-effective pathway to the cloud, b...
Want a really good cyber security strategy? Skip to the end.
|If you’re finding it difficult to develop a consistent cyber security strategy, you’re not alone. The current landscape is a complex one – and that makes it hard for leaders to take a few big steps backwards to think strategically. Meanwhile...
Trust no one, assume the worst and prepare for anything: Zero Trust explainer
|They say trust is the foundation of every good relationship. And in many ways it’s also true in the world of cyber security. You’re hardly going to give someone access to your network if you don’t trust them to do the right thing. In years g...
Leveraging Microsoft Azure for Enhanced Cyber Security
|In today’s tech-driven world, cloud computing has become an indispensable part of almost any business. Among the myriad of cloud platforms available, Microsoft Azure stands out as an exceptional choice, especially if you’re keen on adopting Infra...
How to protect your business from ransomware attacks: Part 2
|Before you read this article, we recommend checking out part one in the series – How to protect your business from ransomware attacks. Or, if you’d like the highlights: Ransomware attacks are on the rise. It’s time for all businesses, large...
How to protect your business from ransomware attacks: Part 1
|Up until a few years ago, the word “ransom” probably brought to mind images of old-fashioned kidnappers who leave behind notes demanding suitcases full of unmarked currency – “and don’t even think about calling the police!”. However, in 2...
What is the role of Security Operations Centres (SOCs) in cyber security?
|The cyber landscape has become a noisy place and is at the forefront of news. Every week we hear about a new major cyber-attack or security threat to citizen data. And those are just the ones that are visible. Meanwhile, millions of cyber events a...
How can military strategy help to improve your cyber security posture?
|Cyberspace has become a battleground – as the Australian Cyber Security Centre (ACSC) warned us in its most recent Cyber Threat Report. If you’re not already thinking like a military strategist to help improve your cyber security posture, now is ...