Cyber Security and Business Resilience Blog
Welcome to the Sekuro blog, your go-to destination for cyber security and business resilience insights!
Stay ahead of the hackers
With Sekuro, you can rest assured that your business is protected from the sneaky cyber criminals. Our team of experts will help you take a strategic approach to cyber security risk mitigation, so you can stay one step ahead of those mischievous hackers.
Transform digitally, without the drama
We believe that digital transformation should be exciting, not scary. With Sekuro by your side, you can confidently navigate the digital landscape and embrace new technologies without risking your business’s security. Let us show you how to transform with resilience!
Insights that will make you think
Our Cyber Security and Business Resilience Blog is jam-packed with eye-opening articles and practical tips that will leave you thinking! From understanding the latest threats to implementing robust security measures, we’ve got you covered.
No jargon or tech mumbo-jumbo
We know that cyber security can be a complex topic, but we promise to keep it simple. Our blog posts are written in plain English (no tech mumbo-jumbo here!) so that everyone, regardless of their technical background, can benefit from our insights.
Sekuro Blog
ISO Goes Green: What You Need to Know About the Climate Change Addition to ISO Standards
What happened? On 23 February 2024, the International Organisation for Standardization (ISO) passed a <a href=”https://iaf.nu/en/news/iaf-and-iso-publish-joint-communique/”>resolution</a> to add two new statements on climate change to several existing management systems standards.
Emerging Threat: AI vs. Human Deceit
In today’s digital world, phishing has taken on a new form that blends human tricks with advanced technology. It’s not just about old-fashioned deception anymore. We’re witnessing a blend of
UK Data Protection Bill vs. EU GDPR
Discover the differences between the UK Data Protection Bill and EU GDPR for Australian organisations handling European citizens’ data.
The Adversarial Mindset: Think Like Your Attacker
The Adversarial Mindset: Think like your adversary with Sekuro. Fortify defenses, enhance threat modeling, incident response, Zero Trust.
Secure Data Hosting for Service Providers with the Hosting Certification Framework (HCF)
An Introduction to the HCF As the Australian Government’s vision to establish six cyber shields to uplift Australia’s security posture progresses, the Government’s frameworks will play a key role in
Application Control and Its Relevance in 2024
Find out the significance of application control in 2024 cyber security strategies, and how it enhances defenses against evolving threats and streamlines incident response.
It’s Time We Modernise Cyber Security
Why are security breaches not reducing by the amount we’re spending? Find out the ingredients of a modern security strategy.
Cyber Security Observations on the UK Market
Calum McNab, Head of UK for Sekuro, shares his observations on the surprising similarities between the Australian and UK state of Cyber Security.
Introduction to the Common Control Framework (CCF)
Learn how the Common Control Framework (CCF) can help simplify compliance management and enhance cyber security posture. The CCF is a set of internal security controls derived from various security
Reflections on 2023
Sekuro CEO, Noel Allnutt, reflects on 2023 and shares his optimism for 2024.
The Grinch Who Stole Corporate Secrets: The Rise of Insider Threats Over Christmas
In the festive spirit of Christmas, there lurks an often-overlooked adversary within the walls of businesses and corporations – the insider threat.
IAM and IGA: What Are They And What’s The Difference?
Explore the key differences between Identity Access Management (IAM) and Identity Governance Administration (IGA) which lie on the function, extent, and purpose of the two solutions.