May 12,2022


FEATURED
IS THE AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY (APRA) GOING TO BEGIN MANDATING SOC2 COMPLIANCE?
The current threat landscape is ever-changing. Coupled with maintaining privacy and ongoing security challenges that CISO’s and security managers face day to day, compliance requirements get more complicated when organisations partner with third-party businesses such as SaaS platforms and managed service providers.
FEATURED
THE LATEST ON THE LOG4J 2 VULNERABILITY,
BY THE LOOP SECURE SOC
Over the past few days, the Log4j vulnerability has made significant headlines across the cybersecurity industry and mainstream media.
LATEST BLOGS
POPULAR TAGS
- Insider
- Board Level Cyber Security
- Managed Security Services
- Governance Risk and Compliance
- Managed Detection & Response
- Cyber Security Awareness
- Return on Investment
- C-Suite
- Multi Factor Authentication
- RSA
- Penetration Testing
- Network Security
- Cyber Security Budgets
- Web Application Penetration Testing
- Data Loss Prevention
- Global Pandemics
- Identity and Access Management
- Zero Trust Architecture
- Cloud Security
- cyber security strategy
- cyber security vendors
- End Point Detection and Response
- Executive Level Cyber Security
- News
- SecurID
- Security Managers
- Working From Home
- AlienVault SIEM
- Data Sovereignty
- Entrust DataCard
- Entrust PKI as a Service
- Microsoft Zero Trust
- NDB
- Notifiable Data Breaches Scheme
- Offensive Security
- Operational Technology
- Proofpoint
- SSL Certificates
- zero day
- 27001
- APRA
- Adversary Simulation
- Artificial Intelligence
- CPS234
- Certification
- Cyber risk
- IR Advice
- IoT
- Mining Sector
- NIST
- Objective-based penetration testing
- Red Teaming
- SOC2
- Secure Code Warrior
- Secure Remote Access
- Training
- Vulnerability Management Services
- asic
- assessing IT vendors
- data breach
- log4j2
- risk assessment
- zero trust