An Enterprise View of Software Defined Perimeter

An Enterprise View of Software Defined Perimeter

As cloud computing and unmanaged endpoints continue to gain traction, it is a foregone conclusion that information security technical controls must become more virtual – that is to say, software-based. Rapidly disappearing are the days of physical perimeters and hardwired network architectures. One of Cloud Security Alliance’s most promising research projects, Software Defined Perimeter (SDP), [...]

How Do We Stack Up to Gartner’s Five Steps for Ransomware Protection?

How Do We Stack Up to Gartner’s Five Steps for Ransomware Protection?

Gartner’s June 2016 article, “Use These Five Backup and Recovery Best Practices to Protect Against Ransomware,” outlines five steps for mitigating the threat and/or risk of being hit with ransomware. I will spare you the market stats and dollar figures intended to scare you into taking action now. If you have an affinity for ransomware horror stories, click here, here, here, or [...]

Implementation Life Cycle “Posterized” in Free COBIT 5 Download

Implementation Life Cycle “Posterized” in Free COBIT 5 Download

COBIT 5’s Seven Phases of the Implementation Life Cycle have been “posterized” into a free download that illustrates the framework’s program management, change enablement and continual improvement life cycle. The poster is part of the COBIT 5 framework for the governance and management of enterprise IT, which is highly valued by commercial, not-for-profit and public-sector [...]

Cyberthreat Information Sharing: An Industry Imperative to Increase Australia’s Cyber Resilience

Cyberthreat Information Sharing: An Industry Imperative to Increase Australia’s Cyber Resilience

It’s no doubt cybersecurity provides longevity to a business and can help differentiate it from its competitors – for both good and not so good reasons. Organisations, both in the public and private sector, need to have strong cybersecurity fundamentals to provide trust and confidence to citizens, businesses and customers alike. As we have seen, [...]

Announcing the LabyREnth Capture the Flag (CTF) Challenge

Announcing the LabyREnth Capture the Flag (CTF) Challenge

We’re proud to announce that LabyREnth, the Unit 42 Capture the Flag (CTF) challenge, is open to the public and ready to test your malware analysis and reverse engineering skills. You’ll have until 11:59pm on August 14th, 2016 to run through more than 25 challenges built by some of the industries best threat researchers and [...]