Articles
From Panicked to Prepared: Strengthening Organisational Resilience
Every organisation, during their lifecycle is bound to encounter unforeseen challenges which put their resilience to the test. At times, your strength is stretched to its limits, and failures can…
Incident Response: The Secret Weapon Against Cyber Pirates
It’s no secret that hackers are literally and figurately circling our organisations. We simply refresh our news browsers to see the effects these online entities have on…
Enter Entra
As technology experts, we’re used to things going bump in the night, but last night we slept soundly as Microsoft made more additions to the services under ‘Entra’ moniker, and introduced a new ‘…
Beyond the Ransom: The Collateral Damage of Cyber Attacks on Primary Food Production
Picture a typical food production enterprise: a complex web of interconnected processes and systems, all of which are increasingly digitalized and automated. Then imagine the chaos if a ransomware…
Combat Cyber Threats: The War Game for All Industries
Financial services companies are gearing up to participate in a series of exercises with the intention to test their responsiveness to cyberattacks. It goes without saying that banks and other…
Hack & Sip: The Wrap Up
We are thrilled to reflect on the success of our second Hack and Sip event, which took place on May 25th in partnership with the prestigious The Royal Exchange of Sydney. The turnout was excellent…
ChatGPT and AI: Unlocking the Potential; Collaboration is Key
Artificial Intelligence (AI) has been a hot topic for several decades, with ongoing research and development to enhance machine intelligence, intuitive capabilities, and human-like behaviour.…
Cyber Security Preparedness: 8 Questions Your Organisation Must Answer
From identifying critical systems and data assets, to having business continuity and disaster recovery plans, to understanding legislative obligations for reporting cyber security incidents, we…