Skip to main content
Charlie Hales
Written byCharlie Hales

From Panicked to Prepared: Strengthening Organisational Resilience

Every organisation, during their lifecycle is bound to encounter unforeseen challenges which put their resilience to the test. At times, your strength is stretched to its limits, and failures can…

Ryan Williams

Incident Response: The Secret Weapon Against Cyber Pirates

It’s no secret that hackers are literally and figurately circling our organisations. We simply refresh our news browsers to see the effects these online entities have on…

George Hewitt
Written byGeorge Hewitt

Enter Entra

As technology experts, we’re used to things going bump in the night, but last night we slept soundly as Microsoft made more additions to the services under ‘Entra’ moniker, and introduced a new ‘…

Ryan Williams

Beyond the Ransom: The Collateral Damage of Cyber Attacks on Primary Food Production

Picture a typical food production enterprise: a complex web of interconnected processes and systems, all of which are increasingly digitalized and automated. Then imagine the chaos if a ransomware…

Charlie Hales
Written byCharlie Hales

Combat Cyber Threats: The War Game for All Industries

Financial services companies are gearing up to participate in a series of exercises with the intention to test their responsiveness to cyberattacks. It goes without saying that banks and other…

Charlie Hales
Written byCharlie Hales

Hack & Sip: The Wrap Up

We are thrilled to reflect on the success of our second Hack and Sip event, which took place on May 25th in partnership with the prestigious The Royal Exchange of Sydney. The turnout was excellent…

Charlie Hales
Written byCharlie Hales

ChatGPT and AI: Unlocking the Potential; Collaboration is Key

Artificial Intelligence (AI) has been a hot topic for several decades, with ongoing research and development to enhance machine intelligence, intuitive capabilities, and human-like behaviour.…

Charlie Hales
Written byCharlie Hales

Cyber Security Preparedness: 8 Questions Your Organisation Must Answer

From identifying critical systems and data assets, to having business continuity and disaster recovery plans, to understanding legislative obligations for reporting cyber security incidents, we…