by Paul Friend | Nov 6, 2025 | Blog, ISO 27001
Your first ISO 27001 audit is a major step in your organisation’s information security journey. It is the point where your Information Security Management System (ISMS) is formally assessed by an external auditor to determine whether it meets the requirements of the...
by Paul Friend | Nov 6, 2025 | Blog
Annual penetration tests and noisy vulnerability scanners no longer reflect how modern attacks unfold. In response, many organisations are shifting toward Automated Pentesting with Service providers as a continuous security validation approach. Analysis from...
by Paul Friend | Nov 6, 2025 | Blog
Summary Australia’s cybersecurity industry has evolved rapidly in response to new regulations, increased attack frequency, and rising board-level accountability. In this environment, organisations are demanding proof that their cybersecurity partners operate to...
by Paul Friend | Nov 3, 2025 | Blog
Summary Microsoft Exchange remains at the core of many organisations’ communication systems, but its widespread use makes it a top target for cyber attackers. In October 2025, the NSA, CISA, ASD’s Australian Cyber Security Centre (ACSC), and the Canadian Cyber Centre...
by Paul Friend | Nov 3, 2025 | Blog
Summary Proton has recently launched its Data Breach Observatory, a publicly-facing, free platform that continuously monitors the dark web for data leaks and publishes them in near-real time. Key findings from Proton’s initial research: In 2025 (so far), Proton...