Blog
Less ‘tech talk’ – The secret to an effective CISO
Check out this article by Prashant Haldankar, Co-Founder and CISO of Sekuro, as he shares about the evolving role of CISO in 2022 and the secret to being an effective CISO.
The Sekuro Talkshow with Riley Kidd (Ep.6)
In the sixth episode of Sekuro Talkshow, Sekuro’s Principal Consultant Riley Kidd shares about the benefits of conducting ransomware readiness assessments.
Sekuro is Certified as a Great Place to Work®!
Sekuro has been certified as a Great Place to Work® in 2022 for providing an inclusive and accepting environment for its employees.
The CIO’s Recipe for Digital Transformation
In a feature story in CIO Australia, our co-founder and CIO Karan Khosla shares the recipe for CIOs to drive successful digital transformation.
Women in Security: Sekuro CGO Shamane Tan
Our CGO Shamane Tan was featured in Issue 9 of Women In Security Magazine, where she shares about her thoughts on her cybersecurity journey.
Shared section code execution
Sekuro Principal Consultant, Riley Kidd, demonstrates how to utilise shared sections within a DLL to execute memory in a remote process.
When Cybersecurity Becomes an HR Issue
In this interview, Sekuro’s Managing Director Noel Allnutt shed light on the role of Human Resources (HR) in cybersecurity.
The Patching Time Sink
Sekuro’s Customer CISO, Lee Roebig expounded on the following aspects of Zero Trust, which are fundamental to the security, and hence, the success of an organisation. Organisations who are on top of their patching processes often spend weeks each month patching urgent vulnerabilities and/or resolving any unforeseen impacts they have on systems. They often complete these just in time for the next month when they must do it all again. With organisations often resource constrained, is it the best use of their cyber security/technology teams’ time to spend most of their month patching systems? I believe it isn’t. Many organisations who are resource constrained have also not implemented strong preventative controls due to a lack of time, particularly the more difficult (but extremely valuable) ones like Application Control and Network Segmentation. I’ve spoken to many peers who haven’t implemented these, and the sentiment is remarkably similar from each: “We haven’t had the time” “We’re still trying to get on top the basics like our patching right now” “We’ve got bigger fish to fry. We’ve still got Windows 7 machines in our fleet (or XP!)” While patching most definitely has its place, if we look at this from a risk/benefit analysis perspective, …
Obfuscating Shellcode Entropy
Sekuro Principal Consultant, Riley Kidd, outlines a way to create a loader which could bypass current technologies. Will lower entropy (and encryption) make your loader fully undetectable? No. But it won’t make it worse either….
The Sekuro Talkshow with Werner Coetsee (Ep.5)
In the fifth episode of the Sekuro Talkshow, Werner Coetsee, Director of Managed Security Services at Sekuro, joins Shamane Tan, Sekuro’s Chief Growth Officer, to share benefits and insights about Managed Security Services, which can be a great solution to address organisation’s security needs.
How You Can Implement Zero Trust Even with Limited Resources
Whether it is a person, device, object, or connection, Zero Trust is the belief that we should not trust them until they prove they can be trusted. Check out this blogpost as our Customer CISO, Lee Roebig discusses how organisations can implement Zero Trust even with limited resources
The Sekuro Talkshow with Lee Roebig (Ep.4)
In the fourth episode of the Sekuro Talkshow, Shamane Tan, Sekuro Chief Growth Officer, is joined by Lee Roebig, former Head of Information Security for Fitness and Lifestyle Group, and Sekuro’s current Customer CISO.
Less ‘tech talk’ – The secret to an effective CISO
Check out this article by Prashant Haldankar, Co-Founder and CISO of Sekuro, as he shares about the evolving role of CISO in 2022 and the secret to being an effective CISO.
The Sekuro Talkshow with Riley Kidd (Ep.6)
In the sixth episode of Sekuro Talkshow, Sekuro’s Principal Consultant Riley Kidd shares about the benefits of conducting ransomware readiness assessments.
Sekuro is Certified as a Great Place to Work®!
Sekuro has been certified as a Great Place to Work® in 2022 for providing an inclusive and accepting environment for its employees.
The CIO’s Recipe for Digital Transformation
In a feature story in CIO Australia, our co-founder and CIO Karan Khosla shares the recipe for CIOs to drive successful digital transformation.
Women in Security: Sekuro CGO Shamane Tan
Our CGO Shamane Tan was featured in Issue 9 of Women In Security Magazine, where she shares about her thoughts on her cybersecurity journey.
Shared section code execution
Sekuro Principal Consultant, Riley Kidd, demonstrates how to utilise shared sections within a DLL to execute memory in a remote process.
When Cybersecurity Becomes an HR Issue
In this interview, Sekuro’s Managing Director Noel Allnutt shed light on the role of Human Resources (HR) in cybersecurity.
The Patching Time Sink
Sekuro’s Customer CISO, Lee Roebig expounded on the following aspects of Zero Trust, which are fundamental to the security, and hence, the success of an organisation. Organisations who are on top of their patching processes often spend weeks each month patching urgent vulnerabilities and/or resolving any unforeseen impacts they have on systems. They often complete these just in time for the next month when they must do it all again. With organisations often resource constrained, is it the best use of their cyber security/technology teams’ time to spend most of their month patching systems? I believe it isn’t. Many organisations who are resource constrained have also not implemented strong preventative controls due to a lack of time, particularly the more difficult (but extremely valuable) ones like Application Control and Network Segmentation. I’ve spoken to many peers who haven’t implemented these, and the sentiment is remarkably similar from each: “We haven’t had the time” “We’re still trying to get on top the basics like our patching right now” “We’ve got bigger fish to fry. We’ve still got Windows 7 machines in our fleet (or XP!)” While patching most definitely has its place, if we look at this from a risk/benefit analysis perspective, we see that the scale is skewed. There is too much time being spent on the Band-Aid fix of patching. In fact, so much time is spent patching that there is little of it left for fixing the fundamental underlying issues. This poses an interesting thought: If an asset is …
Obfuscating Shellcode Entropy
Sekuro Principal Consultant, Riley Kidd, outlines a way to create a loader which could bypass current technologies. Will lower entropy (and encryption) make your loader fully undetectable? No. But it won’t make it worse either….
The Sekuro Talkshow with Werner Coetsee (Ep.5)
In the fifth episode of the Sekuro Talkshow, Werner Coetsee, Director of Managed Security Services at Sekuro, joins Shamane Tan, Sekuro’s Chief Growth Officer, to share benefits and insights about Managed Security Services, which can be a great solution to address organisation’s security needs.
How You Can Implement Zero Trust Even with Limited Resources
Whether it is a person, device, object, or connection, Zero Trust is the belief that we should not trust them until they prove they can be trusted. Check out this blogpost as our Customer CISO, Lee Roebig discusses how organisations can implement Zero Trust even with limited resources
The Sekuro Talkshow with Lee Roebig (Ep.4)
In the fourth episode of the Sekuro Talkshow, Shamane Tan, Sekuro Chief Growth Officer, is joined by Lee Roebig, former Head of Information Security for Fitness and Lifestyle Group, and Sekuro’s current Customer CISO.