May 12,2022


FEATURED
IS THE AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY (APRA) GOING TO BEGIN MANDATING SOC2 COMPLIANCE?
The current threat landscape is ever-changing. Coupled with maintaining privacy and ongoing security challenges that CISO’s and security managers face day to day, compliance requirements get more complicated when organisations partner with third-party businesses such as SaaS platforms and managed service providers.
FEATURED
THE LATEST ON THE LOG4J 2 VULNERABILITY,
BY THE LOOP SECURE SOC
Over the past few days, the Log4j vulnerability has made significant headlines across the cybersecurity industry and mainstream media.
TAGS
- Insider
- Board Level Cyber Security
- Managed Security Services
- Governance Risk and Compliance
- Managed Detection & Response
- Cyber Security Awareness
- Return on Investment
- C-Suite
- Multi Factor Authentication
- RSA
- Penetration Testing
- Network Security
- Cyber Security Budgets
- Web Application Penetration Testing
- Data Loss Prevention
- Global Pandemics
- Identity and Access Management
- Zero Trust Architecture
- Cloud Security
- cyber security strategy
- cyber security vendors
- End Point Detection and Response
- Executive Level Cyber Security
- News
- SecurID
- Security Managers
- Working From Home
- AlienVault SIEM
- Data Sovereignty
- Entrust DataCard
- Entrust PKI as a Service
- Microsoft Zero Trust
- NDB
- Notifiable Data Breaches Scheme
- Offensive Security
- Operational Technology
- Proofpoint
- SSL Certificates
- zero day
- 27001
- APRA
- Adversary Simulation
- Artificial Intelligence
- CPS234
- Certification
- Cyber risk
- IR Advice
- IoT
- Mining Sector
- NIST
- Objective-based penetration testing
- Red Teaming
- SOC2
- Secure Code Warrior
- Secure Remote Access
- Training
- Vulnerability Management Services
- asic
- assessing IT vendors
- data breach
- log4j2
- risk assessment
- zero trust
LATEST BLOGS
May 9,2022
April 27,2022
March 23,2022
February 1,2022
February 1,2022
January 12,2022
December 16,2021
November 8,2021
November 4,2021
September 21,2021
August 30,2021
June 24,2021
May 17,2021
April 27,2021
February 17,2021
December 15,2020
August 13,2020
February 9,2020
January 27,2020
August 5,2019
April 16,2019
December 13,2018
November 15,2018
October 22,2018
October 10,2018
October 1,2018
September 25,2018
September 12,2018
August 28,2018
August 22,2018
July 19,2018
July 8,2018
May 27,2018
November 29,2017
July 18,2017
February 22,2017
June 14,2016
May 31,2016
February 23,2016
January 11,2016
December 16,2015
November 30,2015
November 20,2015
October 8,2015
September 24,2015
September 21,2015
September 3,2015
August 31,2015
August 20,2015
August 13,2015
August 6,2015
June 10,2015
December 17,2014
December 15,2014
December 3,2014
November 19,2014
September 24,2014
April 11,2010
POPULAR TAGS
- Insider
- Board Level Cyber Security
- Managed Security Services
- Governance Risk and Compliance
- Managed Detection & Response
- Cyber Security Awareness
- Return on Investment
- C-Suite
- Multi Factor Authentication
- RSA
- Penetration Testing
- Network Security
- Cyber Security Budgets
- Web Application Penetration Testing
- Data Loss Prevention
- Global Pandemics
- Identity and Access Management
- Zero Trust Architecture
- Cloud Security
- cyber security strategy
- cyber security vendors
- End Point Detection and Response
- Executive Level Cyber Security
- News
- SecurID
- Security Managers
- Working From Home
- AlienVault SIEM
- Data Sovereignty
- Entrust DataCard
- Entrust PKI as a Service
- Microsoft Zero Trust
- NDB
- Notifiable Data Breaches Scheme
- Offensive Security
- Operational Technology
- Proofpoint
- SSL Certificates
- zero day
- 27001
- APRA
- Adversary Simulation
- Artificial Intelligence
- CPS234
- Certification
- Cyber risk
- IR Advice
- IoT
- Mining Sector
- NIST
- Objective-based penetration testing
- Red Teaming
- SOC2
- Secure Code Warrior
- Secure Remote Access
- Training
- Vulnerability Management Services
- asic
- assessing IT vendors
- data breach
- log4j2
- risk assessment
- zero trust