Latest Blog.
Mandatory Breach Reporting. What's Changed and How You'll Know You're Ready.
|Data matters. Where it lives. How it’s managed. And how it’s secured. Yet last year, over 31% of Australian organisation were breached1. So how will you know when you’re ready? New Mandatory Breach Reporting obligations now apply for organisati...
Critical Intel, AMD and ARM Processor Vulnerability Response
|On the 4th of January 2018, details of two critical hardware vulnerabilities Spectre (CVE-2017-5753, CVE-2017-5715) and Meltdown (CVE-2017-5754) emerged that impact the majority of computers running Intel Processors (Spectre and Meltdown), AMD and A...
Don’t Forget The Basics of Network Security (Part 2)
|In an earlier article, we looked at network security basics and how we can borrow guidance from the PCI Data Security Standard to make sure our firewall rules are documented and reviewed on a regular basis. This articl...
Don’t Forget the Basics of Network Security (Part 1)
|It seems every week you read a story about unsecured databases being exposed on the Internet, information being held for ransom, or even children’s teddy bears being attacked without their owner’s knowledge. While ...
Researchers create first practical attack on SHA-1
|TL;DR Researchers create first practical attack on SHA-1. If you use SHA-1, start moving to SHA-256/SHA-3. What is SHA-1? The Secure Hash Algorithm 1 (SHA-1) was created by the NSA and first published in 1995 as an improvement on the previously popu...
People Power - Macquarie Technology Group Unveils New Brand
|Embargoed 12.01am Thursday 28 July Macquarie Technology Group today unveiled its new brand, reflecting the evolution and strengths of the business. “This is not simply a fresh coat of paint – far from it,” Chief Executive David Tudehope said. ...