CyberSecurity resources

Protect your organisation's critical assets with our comprehensive cybersecurity resource centre.

We provide valuable insights and tools to keep your business protected.

Featured Cyber Security Services

John Reeman

Virtual CISO Services

Are you finding it challenging to recruit a full time security expert?  

It's hard to find and keep good security professionals and many growing businesses can't justify the expense of hiring a full time CISO.

Cyooda Security can provide an on demand expert on a medium to long term, part time basis, at a fraction of the cost of employing a full time CISO.

Managed CyberSecurity Services


Managed CyberSecurity Service


Cyber criminals are targeting small to medium sized businesses across Australia, crippling under protected companies with ransomware, persistent malware and other sophisticated threats. It’s time to fight back! 


Cyber Security How To's

Vulnerability Management

Vulnerability Management Metrics: How to be effective

🔒Implementing a robust Vulnerability Management Program is a critical step in strengthening your organisation’s cyber defences. But how do you determine its effectiveness? Success cannot be measured merely by the number of vulnerabilities identified or patches applied.🔒 Key metrics can provide a clear picture of your program’s performance and effectiveness. Here are a few critical…
Read More
Data Security and Privacy

Data Privacy: What is Personally Identifiable Information (PII)?

What is Personally Identifiable Information (PII) In a world where personal information is constantly being shared and disseminated online, protecting your privacy has become more important than ever. Understanding what constitutes Personally Identifiable Information (PII) is crucial in safeguarding your sensitive data. From your name and address to your superannuation number and banking details, PII…
Read More
Virtual CISO

Virtual CISO for hire: Reduce cyber risk for your business

As cybersecurity threats continue to evolve and become more sophisticated, organizations must stay one step ahead to protect their valuable data and assets. In today’s digital landscape, the role of a Chief Information Security Officer (CISO) is vital in ensuring the security of an organization’s systems and information. However, not every organization has the resources…
Read More
Data Security and Data Privacy

Data Privacy in Australia: Safeguard Your Personal Data

In an increasingly interconnected digital world, data privacy has become a critical concern for individuals and businesses alike. Nowhere is this more evident than in Australia, where safeguarding online information has taken on utmost importance. With cyber threats on the rise and data breaches becoming more frequent, protecting sensitive data has become imperative for Australians.…
Read More
How to build strong cybersecurity foundations

How to build a successful cybersecurity program

In this video I will be taking you through a cybersecurity framework that I have developed and perfected over the last 25 years to help organisations build strong cybersecurity programs, reduce risk and remain safe.   Ready to find out more? Book in a Call
Read More
Data Security and AI

Data Security and Privacy: Time to act is now!

With the latest Data Privacy law reforms on the horizon and having just finished off Privacy Awareness Week, #PAW2024, in Australia this article is aimed at all organisations that hold sensitive data. Data breaches are nasty, and they impact everyone involved. Australia has seen some of the largest data breaches over the last 18 months.…
Read More
To be or not to be a ciso

To be or not to be a CISO

Do you aspire to be a CISO? As a former CISO, I felt compelled to write this article after seeing many articles about the role of a CISO and opinions on how hard it is becoming. I’m uncertain whether many people today would actually aspire to be a CISO given the pressures, the demands of…
Read More
Hidden Code

How To: Email Phishing, malicious payload analysis walkthrough

The other day I received a malicious phishing email with what appeared to be an invoice but in fact was a javascript embedded in an HTML document. So let’s get into it. Initial Inspection When I initially opened the document in my visual code editor it appeared as follows: The second line declares a variable…
Read More
Data Security and AI

Data Security in the era of AI

In the era of AI, forward-thinking organisations need to adopt a new approach to protecting their most sensitive data. The growing volume of data and the propensity of its use means that organisations can no longer rely on traditional and manual data processing methods to manage unstructured data. The only way to manage data in the future will be with automation, and ironically AI.
Read More

CyberChef : how to decode your data the easy way

Intro If you haven’t heard of CyberChef you may be thinking is a new robot being created to compete on the next series of “My Kitchen Rules” or go head to head with Gordon Ramsay on “Kitchen Nightmares”! Actually CyberChef or at least the one I’m referring to is actually a really cool tool developed…
Read More
Cybersecurity Metrics

How to measure the success of your cybersecurity program

Being asked to present to the board and other key stakeholders in your business about the state of your cybersecurity program can be a daunting prospect. Putting aside the technical jargon can also be challenging for even the most seasoned security professional.
Read More
Cyooda Security share their knowledge on how to build ransomware resilience

Ransomware Resilience: How to prepare and respond in a crisis

Are you prepared for a ransomware attack? What should you do if you become a victim? This guide provides some practical advice you need to know & do to survive.
Read More
How to detect EDR and SIEM evasion techniques

Time altering techniques to evade your security controls

In this article I’ll be talking about ‘Time Travel’ and sadly it’s not an episode of ‘Dr Who’ or ‘Back to the Future’ and not really ‘Time Travel’ but I needed a catchy title! So what I am referring to is how hackers often change the system time of a particular system they are exploiting…
Read More
Cyber Security Automation

Endpoint Security Part 5: How to setup an automated isolation workflow when malware is detected

In this continuing series on endpoint security protections I’ll be showing you how to fully automate host isolation using ‘Tines’ and ‘Elastic’. This article assumes you are familiar with using Elastic SIEM and have some exposure to Tines.  Tines is a smart automation workflow solution that I came across last year.   What I like about…
Read More
Cyooda Incident Response

Endpoint Security Part 4: How to create a playbook to isolate a machine and alert your SOC team

Overview In this fourth article of a 5 part series on ‘Endpoint Security’ I’m going to be showing you how to create a rule in your Elastic SIEM to generate an alert and isolate a host if the presence of malware is detected. Step One – Create the detection rule In your Kibana console select:…
Read More
Endpoint Security Part 3: Threat Intelligence

Endpoint Security Part 3: How to correlate threat intelligence

Overview In this third article of a 5 part series on ‘Endpoint Security’ I’m going to be showing you how you can incorporate ‘Threat Intelligence’ into your security operations strategy. There has been a lot written about threat intelligence over the last decade and it has different meanings to people depending on what industry you…
Read More
Data enrichment with Elastic

Endpoint Security Part 2: Enriching your security event data

In this second part series on ‘Endpoint Security’ I’m going to delve into how you can enrich your security event data to provide further context to assist your security analysts when investigating incidents. In this example we will lead off where we ended from ‘Endpoint Security Part 1’  and so if you were following the…
Read More
Conditional Access Policies

Why you need Azure Conditional Access Policies

Overview Having undertaken a number of Red Team assessments over the last 5 years, one of the common things that is uncovered during these assessments is the lack of robust Microsoft Azure AD conditional access policies. Microsoft Azure AD Conditional access is a premium feature and disabled by default. To enable it you need a…
Read More

Keeping your service provider honest!

We all expect our service providers to do the right thing, abide by contractural terms, provide support when they are meant to and be available when in need. However, sometimes that doesn’t always happen and so how do you keep your provider on the hook if things do go awry? In this example I’ll look…
Read More

Newsletter Archive

Ready to have a conversation?

Find out how Cyooda Security can help improve your organisation's security culture, recognise threats and improve your overall cyber resilience.

Join over 2500+ people who receive our cyber security tips and news every 2 weeks

Cyooda Security - Leading provider of cyber security services in Australia

Lvl 17, Angel Place,

123 Pitt Street,


NSW 2000

 (02) 7230 1350

Message us >>