

FEATURED
IS THE AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY (APRA) GOING TO BEGIN MANDATING SOC2 COMPLIANCE?
The current threat landscape is ever-changing. Coupled with maintaining privacy and ongoing security challenges that CISO’s and security managers face day to day, compliance requirements get more complicated when organisations partner with third-party businesses such as SaaS platforms and managed service providers.
FEATURED
THE LATEST ON THE LOG4J 2 VULNERABILITY,
BY THE LOOP SECURE SOC
Over the past few days, the Log4j vulnerability has made significant headlines across the cybersecurity industry and mainstream media.
TAGS
- Insider
- Board Level Cyber Security
- Managed Security Services
- Managed Detection & Response
- Governance Risk and Compliance
- Cyber Security Awareness
- Return on Investment
- C-Suite
- Multi Factor Authentication
- RSA
- Network Security
- Penetration Testing
- Cyber Security Budgets
- Web Application Penetration Testing
- Cloud Security
- Data Loss Prevention
- Global Pandemics
- Identity and Access Management
- Zero Trust Architecture
- cyber security strategy
- cyber security vendors
- End Point Detection and Response
- Executive Level Cyber Security
- News
- SecurID
- Security Managers
- Working From Home
- AlienVault SIEM
- Data Sovereignty
- Entrust DataCard
- Entrust PKI as a Service
- Microsoft Zero Trust
- NDB
- Notifiable Data Breaches Scheme
- Offensive Security
- Operational Technology
- Proofpoint
- SSL Certificates
- data breach
- zero day
- 27001
- APRA
- Adversary Simulation
- Artificial Intelligence
- CPS234
- Certification
- Cyber risk
- IR Advice
- IoT
- Mining Sector
- NIST
- Objective-based penetration testing
- PCI DSS V4.0
- Red Teaming
- SOC2
- Secure Code Warrior
- Secure Remote Access
- Training
- Vulnerability Management Services
- Vulnerability Research
- asic
- assessing IT vendors
- follina
- lastpass
- log4j2
- microsoft 365
- payment security
- pci dss
- risk assessment
- zero trust
LATEST BLOGS
August 26,2022
August 16,2022
May 12,2022
May 9,2022
April 27,2022
POPULAR TAGS
- Insider
- Board Level Cyber Security
- Managed Security Services
- Managed Detection & Response
- Governance Risk and Compliance
- Cyber Security Awareness
- Return on Investment
- C-Suite
- Multi Factor Authentication
- RSA
- Network Security
- Penetration Testing
- Cyber Security Budgets
- Web Application Penetration Testing
- Cloud Security
- Data Loss Prevention
- Global Pandemics
- Identity and Access Management
- Zero Trust Architecture
- cyber security strategy
- cyber security vendors
- End Point Detection and Response
- Executive Level Cyber Security
- News
- SecurID
- Security Managers
- Working From Home
- AlienVault SIEM
- Data Sovereignty
- Entrust DataCard
- Entrust PKI as a Service
- Microsoft Zero Trust
- NDB
- Notifiable Data Breaches Scheme
- Offensive Security
- Operational Technology
- Proofpoint
- SSL Certificates
- data breach
- zero day
- 27001
- APRA
- Adversary Simulation
- Artificial Intelligence
- CPS234
- Certification
- Cyber risk
- IR Advice
- IoT
- Mining Sector
- NIST
- Objective-based penetration testing
- PCI DSS V4.0
- Red Teaming
- SOC2
- Secure Code Warrior
- Secure Remote Access
- Training
- Vulnerability Management Services
- Vulnerability Research
- asic
- assessing IT vendors
- follina
- lastpass
- log4j2
- microsoft 365
- payment security
- pci dss
- risk assessment
- zero trust