Why having a Virtual CISO is important for your business?

Virtual CISO Costs

Virtual CISO Services Australia 💼 Small to medium-sized businesses (SMBs) often underestimate their vulnerability to cyber threats, primarily because they lack the necessary tools and expertise to protect against these risks. That’s where a 𝐕𝐢𝐫𝐭𝐮𝐚𝐥 𝐂𝐈𝐒𝐎 (Chief Information Security Officer) comes into play! 💼 A Virtual CISO is not only a cost-effective solution, but they…

Read More

How to build a successful cybersecurity program

How to build strong cybersecurity foundations

In this video I will be taking you through a cybersecurity framework that I have developed and perfected over the last 25 years to help organisations build strong cybersecurity programs, reduce risk and remain safe.   Ready to find out more? Book in a Call

Read More

Data Security and Privacy: Time to act is now!

Data Security and AI

With the latest Data Privacy law reforms on the horizon and having just finished off Privacy Awareness Week, #PAW2024, in Australia this article is aimed at all organisations that hold sensitive data. Data breaches are nasty, and they impact everyone involved. Australia has seen some of the largest data breaches over the last 18 months.…

Read More

To be or not to be a CISO

To be or not to be a ciso

Do you aspire to be a CISO? As a former CISO, I felt compelled to write this article after seeing many articles about the role of a CISO and opinions on how hard it is becoming. I’m uncertain whether many people today would actually aspire to be a CISO given the pressures, the demands of…

Read More

How To: Email Phishing, malicious payload analysis walkthrough

Hidden Code

The other day I received a malicious phishing email with what appeared to be an invoice but in fact was a javascript embedded in an HTML document. So let’s get into it. Initial Inspection When I initially opened the document in my visual code editor it appeared as follows: The second line declares a variable…

Read More

Data Security in the era of AI

Data Security and AI

In the era of AI, forward-thinking organisations need to adopt a new approach to protecting their most sensitive data.

The growing volume of data and the propensity of its use means that organisations can no longer rely on traditional and manual data processing methods to manage unstructured data. The only way to manage data in the future will be with automation, and ironically AI.

Read More

CyberChef : how to decode your data the easy way

CyberChef

Intro If you haven’t heard of CyberChef you may be thinking is a new robot being created to compete on the next series of “My Kitchen Rules” or go head to head with Gordon Ramsay on “Kitchen Nightmares”! Actually CyberChef or at least the one I’m referring to is actually a really cool tool developed…

Read More

How to build and maintain a successful cybersecurity program

Cyooda Security: Building a successful cybersecurity program

In this article I’m going to be talking about how to build a successful cybersecurity program. This unique strategy is something I’ve learned and put into action over the last 30 years and that has helped to keep organisations safe, build resilience and maintain a continuous improvement plan that provides a WIN WIN for cybersecurity…

Read More