Loop Technology

Call us: 1800 806 563

  • Challenges
    • Detecting and Responding to Threats
    • Building a SOC
    • Testing your defences
    • Managing your security program
  • Solutions
    • Managed Services
      • Managed Detection and Response
      • Incident response
      • Vulnerability Management
      • Endpoint Protection
      • Network Protection
      • Multi Factor Authentication & Strong Single Sign On
      • Security Awareness for Employees
      • Security Awareness for Developers
      • Security Operations Metrics
      • Virtual Security Office
      • PCI Continual Compliance Service
      • Cloud GRC App
      • Red Teaming as a Service
      • Phishing as a Service
      • Cloud MSS
    • GOVERNANCE, RISK & COMPLIANCE
      • Cyber Security Strategy
      • Cyber Risk Management
      • Compliance Management
      • PCI Compliance
      • ISO 27001
      • Cyber Security Gap Assessment
      • Cyber Security Technical Assessments
      • Cloud Security Reviews
    • OFFENSIVE SECURITY SERVICES
      • Penetration Testing
      • Web and Mobile Application Testing
      • Red Teaming
      • Purple Teaming
      • Phishing
      • Social Engineering
      • Physical Assessment
    • Hardware & Software For IT Security
      • Control Selection and Implementation
      • Security Licensing and Maintenance
      • Security Monitoring Products
      • Endpoint Security Products
      • IOT Products
      • Authentication & Single Sign On
      • Digital Encryption and SSL
  • Blog
    • INFINTE SECURITY
    • Loop Secure
  • About
    • About Us
    • Join Us
    • APPROACH
    • WHO WE HELP
  • Contact
  • Challenges
    • Detecting and Responding to Threats
    • Building a SOC
    • Testing your defences
    • Managing your security program
  • Solutions
    • Managed Services
      • Managed Detection and Response
      • Incident response
      • Vulnerability Management
      • Endpoint Protection
      • Network Protection
      • Multi Factor Authentication & Strong Single Sign On
      • Security Awareness for Employees
      • Security Awareness for Developers
      • Security Operations Metrics
      • Virtual Security Office
      • PCI Continual Compliance Service
      • Cloud GRC App
      • Red Teaming as a Service
      • Phishing as a Service
      • Cloud MSS
    • GOVERNANCE, RISK & COMPLIANCE
      • Cyber Security Strategy
      • Cyber Risk Management
      • Compliance Management
      • PCI Compliance
      • ISO 27001
      • Cyber Security Gap Assessment
      • Cyber Security Technical Assessments
      • Cloud Security Reviews
    • OFFENSIVE SECURITY SERVICES
      • Penetration Testing
      • Web and Mobile Application Testing
      • Red Teaming
      • Purple Teaming
      • Phishing
      • Social Engineering
      • Physical Assessment
    • Hardware & Software For IT Security
      • Control Selection and Implementation
      • Security Licensing and Maintenance
      • Security Monitoring Products
      • Endpoint Security Products
      • IOT Products
      • Authentication & Single Sign On
      • Digital Encryption and SSL
  • Blog
    • INFINTE SECURITY
    • Loop Secure
  • About
    • About Us
    • Join Us
    • APPROACH
    • WHO WE HELP
  • Contact
SOCIALISE WITH US
  • item 1
  • item 3
Go

FEATURED ARTICLE

Should your organisation use Managed Security Services?

Tags

  • Insider (29)
  • Board Level Cyber Security (15)
  • C-Suite (8)
  • Return on Investment (6)
  • Cyber Security Budgets (4)
  • Web Application Penetration Testing (4)
  • Penetration Testing (3)
  • cyber security strategy (3)
  • Managed Detection & Response (2)
  • Managed Security Services (2)
  • NDB (2)
  • Notifiable Data Breaches Scheme (2)
  • cyber security vendors (2)
  • Artificial Intelligence (1)
  • Governance Risk and Compliance (1)
  • IoT (1)
  • News (1)
  • assessing IT vendors (1)
see all

Author

  • Loop Technology (12)
  • Patrick Butler (12)
  • LYAL COLLINS (7)
  • Adam Robinson (6)
  • David Morrison (6)
  • JULIE KEIZER (3)
  • Kelly Clapham (2)
  • Adam Davenport (1)
  • Topaz Aral (1)
See All
 Back To Blog
Picture of

LYAL COLLINS

SENIOR SECURITY CONSULTANT
Find me on:

Recent Posts

PART 2: What are the top security concerns for financial institutions?

PART ONE: What are the top security concerns for financial institutions?

PEN TESTING - HOW MUCH IS ENOUGH?

Visa compliance validation rules change

Credit Card Fraud in the U.S.

It’s Tax Scam time again!

Eternal Challenges in Security

View All

Subscribe

about loop

  • About Us
  • Join Us
  • Partners

follow us

  • LinkedIn
  • Twitter

Stay Up-to-Date

contact

  • info@loopsec.com.au
  • 1800 806 563

© 2018 All rights reserved. Sitemap. Site by Bang.