August 3,2020


FEATURED
IS THE AUSTRALIAN PRUDENTIAL REGULATION AUTHORITY (APRA) GOING TO BEGIN MANDATING SOC2 COMPLIANCE?
The current threat landscape is ever-changing. Coupled with maintaining privacy and ongoing security challenges that CISO’s and security managers face day to day, compliance requirements get more complicated when organisations partner with third-party businesses such as SaaS platforms and managed service providers.
FEATURED
THE LATEST ON THE LOG4J 2 VULNERABILITY,
BY THE LOOP SECURE SOC
Over the past few days, the Log4j vulnerability has made significant headlines across the cybersecurity industry and mainstream media.
LATEST BLOGS
October 10,2018
October 1,2018
July 18,2017
December 16,2015
October 8,2015
June 10,2015
POPULAR TAGS
- Insider
- Board Level Cyber Security
- Managed Security Services
- Governance Risk and Compliance
- Managed Detection & Response
- Cyber Security Awareness
- Return on Investment
- C-Suite
- Multi Factor Authentication
- RSA
- Penetration Testing
- Network Security
- Cyber Security Budgets
- Web Application Penetration Testing
- Data Loss Prevention
- Global Pandemics
- Identity and Access Management
- Zero Trust Architecture
- Cloud Security
- cyber security strategy
- cyber security vendors
- End Point Detection and Response
- Executive Level Cyber Security
- News
- SecurID
- Security Managers
- Working From Home
- AlienVault SIEM
- Data Sovereignty
- Entrust DataCard
- Entrust PKI as a Service
- Microsoft Zero Trust
- NDB
- Notifiable Data Breaches Scheme
- Offensive Security
- Operational Technology
- Proofpoint
- SSL Certificates
- zero day
- 27001
- APRA
- Adversary Simulation
- Artificial Intelligence
- CPS234
- Certification
- Cyber risk
- IR Advice
- IoT
- Mining Sector
- NIST
- Objective-based penetration testing
- Red Teaming
- SOC2
- Secure Code Warrior
- Secure Remote Access
- Training
- Vulnerability Management Services
- asic
- assessing IT vendors
- data breach
- log4j2
- risk assessment
- zero trust