Blog
The Race for Quantum Supremacy
Quantum computing spells the death knell for conventional encryption. That’s a fact, not speculation, and as the race to build business ready quantum computers hots up, it won’t be long until algorithms like Advanced Encryption Standard (AES) are replaced for a more resilient successor. Even RSA (a public-key cyrtosystem), the basis of many Public Key Infrastructure (PKI) implementations, isn’t safe. RSA relies on it being very difficult to factor large numbers into their prime factors. However, a quantum computer using Shor’s algorithm will factor these numbers significantly faster than classical computers, thus making RSA – and PKI systems – vulnerable to attack. Similarly, AES will be vulnerable to attack using Grover’s algorithm. You’ll find references to both these attack techniques at the end of this blog in case you’re interested. To address this impending reality, researchers are developing quantum-resistant cryptography that relies on a different set of mathematical problems, ones that are difficult for quantum computers to solve. If these new techniques prove successful, and, importantly, implementation is practicable, they will become the new standard for protecting data confidentiality and integrity. Yet while the dream of quantum-resistant cryptography sounds great, in practice there are many challenges to be overcome, and …
Everything You Need to Know About CPS 230
In this article, #Sekuro’s Managing Consultant Zachary Vella highlights the key changes for regulated entities with the new Prudential Standard CPS 230.
Have You Thought About Invoice Fraud Lately?
With the recent news of failing financial institutions, the opportunity for invoice fraud has increased. This article explains what to look out for and the preventative steps you can take.
Digging Deeper into the Models of Generative AI, and the Threats
Tony Campbell, Sekuro’s Director of Research & Innovation, talks about Generative AI and its potential cyber security threat.
Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation
In an increasingly-connected digital world, find out how Brand Trust can be synonymous with digital resilience.
Sekuro Sydney Office Opening
In early February, the Sekuro team celebrated the Grand Opening of our new Sydney office with a great party with our valued clients, partners and staff! During the celebration, our Managing Director, Noel Allnutt, welcomed everyone to Sekuro’s new office where our clients, partners, and staff can come together to collaborate, inspire and work towards greater business resilience. Our new office signals the exciting future we see for Sekuro’s business growth. <img width=”800″ height=”1600″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png” alt=”” loading=”lazy” srcset=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png 800w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-150×300.png 150w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-768×1536.png 768w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery.png 900w” sizes=”(max-width: 800px) 100vw, 800px” /> <h3>More Articles</h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/brand-trust/” target=”_self” title=”Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Brand-Trust-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” rel=”noopener”> Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation </a> </h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” title=”Dude, Where’s My Data? Demystifying Biometrics” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Daltrey-Sekuro-Demystifying-Biometrics-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” rel=”noopener”> Dude, Where’s My Data? Demystifying Biometrics </a> </h3> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” title=”ChatGPT: Weighing …
ChatGPT: Weighing the Benefits and Risks in Cyber Security
While ChatGPT can benefit the cybersecurity industry by increasing #efficiency, improving threat detection, and automating responses, it is not without risks.
8 Cyber Security Steps to Achieve Business Productivity For Remote Workers
With the rise of remote and hybrid workforce, here are the 8 cyber security steps organisations can do to support business productivity and protect their remote workers.
Business Resilience is an Infinite Game in a Cyber World
Noel Allnutt, Managing Director at Sekuro, shares his thoughts on what the first month of 2023 has taught us so far and why business resilience should be top of mind.
5 Ways to Fall Prey to Phishing Attacks
Phishing scams are a common method that cyber criminals use to exploit vulnerabilities. More than 90 percent of cyber attacks start with a phishing email. Learn 5 common ways people fall prey to phishing attacks.
Full Stack Web Attack RCEME Challenge Walkthrough
Check out this article, as Ka Wing Ho, a Security Consultant within Sekuro RED (our talented Offensive Security Team), does a walkthrough of the Full Stack Web Attack RCEME Challenge.
Board vs C-suite: How to get buy-in to manage increased cyber security risk
Today’s cyber risk landscape not only impacts organisations, but also C-suites and boards at a personal level. This article explores how to navigate risk and get the budget you need.
The Race for Quantum Supremacy
Quantum computing spells the death knell for conventional encryption. That’s a fact, not speculation, and as the race to build business ready quantum computers hots up, it won’t be long until algorithms like Advanced Encryption Standard (AES) are replaced for a more resilient successor. Even RSA (a public-key cyrtosystem), the basis of many Public Key Infrastructure (PKI) implementations, isn’t safe. RSA relies on it being very difficult to factor large numbers into their prime factors. However, a quantum computer using Shor’s algorithm will factor these numbers significantly faster than classical computers, thus making RSA – and PKI systems – vulnerable to attack. Similarly, AES will be vulnerable to attack using Grover’s algorithm. You’ll find references to both these attack techniques at the end of this blog in case you’re interested. To address this impending reality, researchers are developing quantum-resistant cryptography that relies on a different set of mathematical problems, ones that are difficult for quantum computers to solve. If these new techniques prove successful, and, importantly, implementation is practicable, they will become the new standard for protecting data confidentiality and integrity. Yet while the dream of quantum-resistant cryptography sounds great, in practice there are many challenges to be overcome, and the question remains: Can we solve these problems in time, since viable commercial quantum computers are drawing ever nearer. It was way back in 1994 when mathematician, Peter Shor, first figured out the algorithm for attacking RSA using a quantum computer, and so the race to find quantum-resistant encryption began. …
Everything You Need to Know About CPS 230
In this article, #Sekuro’s Managing Consultant Zachary Vella highlights the key changes for regulated entities with the new Prudential Standard CPS 230.
Have You Thought About Invoice Fraud Lately?
With the recent news of failing financial institutions, the opportunity for invoice fraud has increased. This article explains what to look out for and the preventative steps you can take.
Digging Deeper into the Models of Generative AI, and the Threats
Tony Campbell, Sekuro’s Director of Research & Innovation, talks about Generative AI and its potential cyber security threat.
Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation
In an increasingly-connected digital world, find out how Brand Trust can be synonymous with digital resilience.
Sekuro Sydney Office Opening
In early February, the Sekuro team celebrated the Grand Opening of our new Sydney office with a great party with our valued clients, partners and staff! During the celebration, our Managing Director, Noel Allnutt, welcomed everyone to Sekuro’s new office where our clients, partners, and staff can come together to collaborate, inspire and work towards greater business resilience. Our new office signals the exciting future we see for Sekuro’s business growth. <img width=”800″ height=”1600″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png” alt=”” loading=”lazy” srcset=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png 800w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-150×300.png 150w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-768×1536.png 768w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery.png 900w” sizes=”(max-width: 800px) 100vw, 800px” /> <h3>More Articles</h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/brand-trust/” target=”_self” title=”Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Brand-Trust-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” rel=”noopener”> Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation </a> </h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” title=”Dude, Where’s My Data? Demystifying Biometrics” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Daltrey-Sekuro-Demystifying-Biometrics-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” rel=”noopener”> Dude, Where’s My Data? Demystifying Biometrics </a> </h3> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” title=”ChatGPT: Weighing the Benefits and Risks in Cyber Security” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Version-1-1-768×400.png” alt=”” loading=”lazy” /></a> AI <h3> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” rel=”noopener”> ChatGPT: Weighing the Benefits and Risks in Cyber Security </a> </h3> <a href=”https://sekuro.io/8-cybersecurity-steps-to-achieve-business-productivity-for-remote-workers/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/8-cybersecurity-steps-to-achieve-business-productivity-for-remote-workers/” target=”_self” title=”8 Cyber Security Steps to Achieve Business Productivity For …
ChatGPT: Weighing the Benefits and Risks in Cyber Security
While ChatGPT can benefit the cybersecurity industry by increasing #efficiency, improving threat detection, and automating responses, it is not without risks.
8 Cyber Security Steps to Achieve Business Productivity For Remote Workers
With the rise of remote and hybrid workforce, here are the 8 cyber security steps organisations can do to support business productivity and protect their remote workers.
Business Resilience is an Infinite Game in a Cyber World
Noel Allnutt, Managing Director at Sekuro, shares his thoughts on what the first month of 2023 has taught us so far and why business resilience should be top of mind.
5 Ways to Fall Prey to Phishing Attacks
Phishing scams are a common method that cyber criminals use to exploit vulnerabilities. More than 90 percent of cyber attacks start with a phishing email. Learn 5 common ways people fall prey to phishing attacks.
Full Stack Web Attack RCEME Challenge Walkthrough
Check out this article, as Ka Wing Ho, a Security Consultant within Sekuro RED (our talented Offensive Security Team), does a walkthrough of the Full Stack Web Attack RCEME Challenge.
Board vs C-suite: How to get buy-in to manage increased cyber security risk
Today’s cyber risk landscape not only impacts organisations, but also C-suites and boards at a personal level. This article explores how to navigate risk and get the budget you need.