Posts by John Reeman
Cyber Security Loop – Edition #10
Each month, I share a quick pulse on what’s happening in the world of cybersecurity – framed for law firm leaders and risk stakeholders across Australia. Think of it as your boardroom-ready headline brief: short, sharp, and trusted. Here’s what’s hot this week — and what you should be thinking about. 🧨 HOT THIS WEEK:…
READ MORE >>The ultimate Top 100 Cyber Security Blogs in the World
This comprehensive list represents the most influential and widely-followed cybersecurity websites, blogs, and resources globally, compiled from multiple industry rankings and expert recommendations. Tier 1: Elite Cybersecurity News & Information Sources (1-25) The Hacker News – Leading cybersecurity news platform with 4.5+ million followers KrebsOnSecurity – Brian Krebs’ investigative cybersecurity journalism Dark Reading – Trusted…
READ MORE >>Welcome to the “CyberSecurity Loop” News Bytes – Edition #9
Last week I ran a live “cybersecurity breach simulation” at the Legal Counsel Forum in Sydney. The format of the 1 hour session allowed delegates to play along as I walked them through a scenario of a data breach. Then using my “colour code framework” we explored the essential elements that make up a well…
READ MORE >>Demystifying an IRAP Assessment: Everything You Need to Know
Is your law firm looking to understand the ins and outs of an IRAP assessment? Look no further! In this comprehensive guide, we will demystify the IRAP assessment and provide you with everything you need to know. The IRAP assessment, or Information Security Registered Assessors Program, is a crucial step in ensuring the security and…
READ MORE >>Unlocking the Potential: The Ultimate Guide to Crafting a Powerful AI Policy
In the rapidly evolving landscape of artificial intelligence (AI), crafting a powerful AI policy is essential for unlocking its potential while ensuring ethical and responsible use. With the technology becoming more widely adopted in various industries, organizations face the challenge of balancing innovation and accountability. In this ultimate guide, we will explore the key principles…
READ MORE >>Attackers only have to get it right once: Defenders 100% of the time!
𝐀𝐭𝐭𝐚𝐜𝐤𝐞𝐫𝐬 𝐨𝐧𝐥𝐲 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 𝐨𝐧𝐜𝐞, 𝐝𝐞𝐟𝐞𝐧𝐝𝐞𝐫𝐬 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐠𝐞𝐭 𝐢𝐭 𝐫𝐢𝐠𝐡𝐭 100% 𝐨𝐟 𝐭𝐡𝐞 𝐭𝐢𝐦𝐞! Do defenders really have to get it right 100% of the time though? 🤔 I’ve heard this phrase so often over the last decade and sometimes by people who should know better, 𝐢𝐭’𝐬 𝐭𝐢𝐦𝐞 𝐭𝐨 𝐜𝐚𝐥𝐥 𝐁𝐒…
READ MORE >>Rapid Cyber Incident Response: The Critical Role of Speed, Quality, and Tooling
Cyberattacks, ranging from ransomware, data breaches, business email compromise to advanced persistent threats (APTs), can strike at any moment, potentially causing significant damage. So having rapid and effective incident response is essential to minimise the impact of cyberattacks and to protect an organisation’s sensitive data, reputation, and business continuity. For organisations of any size, the…
READ MORE >>Unlocking the Secrets of Cloud Digital Forensics | M365
Welcome to the world of cloud forensics, where investigations in cloud environments like AWS, Azure, GCP, and M365 require unique expertise and tools. As organisations increasingly rely on these platforms for their business operations, the need for effective cloud forensics becomes paramount. In this article, we will unveil the intricacies of cloud forensics and explore…
READ MORE >>The Crucial Role of Mobile Device Forensics: Unveiling Hidden Secrets
I think we can all agree that mobile phones have become an extension of ourselves, storing important information about our lives. From personal messages to financial transactions, these devices hold a wealth of data. But what happens when this data is compromised or needs to be unearthed for investigative purposes? This is where digital forensics…
READ MORE >>Email Security 101: Getting the basics right
EMAIL SECURITY 101 This article delves into getting the basics of email security correct in your organisation. So, let’s start with the basics and grounding in terminology! Email basics The original basis of Internet email uses the SMTP protocol, which stands for Simple Mail Transfer Protocol. This protocol has no features for authentication, validation, or…
READ MORE >>