Blog

AI

The Race for Quantum Supremacy

Quantum computing spells the death knell for conventional encryption. That’s a fact, not speculation, and as the race to build business ready quantum computers hots up, it won’t be long until algorithms like Advanced Encryption Standard (AES) are replaced for a more resilient successor. Even RSA (a public-key cyrtosystem), the basis of many Public Key Infrastructure (PKI) implementations, isn’t safe. RSA relies on it being very difficult to factor large numbers into their prime factors. However, a quantum computer using Shor’s algorithm will factor these numbers significantly faster than classical computers, thus making RSA – and PKI systems – vulnerable to attack. Similarly, AES will be vulnerable to attack using Grover’s algorithm. You’ll find references to both these attack techniques at the end of this blog in case you’re interested. To address this impending reality, researchers are developing quantum-resistant cryptography that relies on a different set of mathematical problems, ones that are difficult for quantum computers to solve. If these new techniques prove successful, and, importantly, implementation is practicable, they will become the new standard for protecting data confidentiality and integrity. Yet while the dream of quantum-resistant cryptography sounds great, in practice there are many challenges  to be overcome, and …

Read More →
Risk Management

Everything You Need to Know About CPS 230

In this article, #Sekuro’s Managing Consultant Zachary Vella highlights the key changes for regulated entities with the new Prudential Standard CPS 230.

Read More →
Cyber Security

Have You Thought About Invoice Fraud Lately?

With the recent news of failing financial institutions, the opportunity for invoice fraud has increased. This article explains what to look out for and the preventative steps you can take.

Read More →
AI

Digging Deeper into the Models of Generative AI, and the Threats

Tony Campbell, Sekuro’s Director of Research & Innovation, talks about Generative AI and its potential cyber security threat.

Read More →
Brand

Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation

In an increasingly-connected digital world, find out how Brand Trust can be synonymous with digital resilience.

Read More →

Sekuro Sydney Office Opening

In early February, the Sekuro team celebrated the Grand Opening of our new Sydney office with a great party with our valued clients, partners and staff!  During the celebration, our Managing Director, Noel Allnutt, welcomed everyone to Sekuro’s new office where our clients, partners, and staff can come together to collaborate, inspire and work towards greater business resilience. Our new office signals the exciting future we see for Sekuro’s business growth. <img width=”800″ height=”1600″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png” alt=”” loading=”lazy” srcset=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png 800w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-150×300.png 150w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-768×1536.png 768w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery.png 900w” sizes=”(max-width: 800px) 100vw, 800px” /> <h3>More Articles</h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/brand-trust/” target=”_self” title=”Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Brand-Trust-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” rel=”noopener”> Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation </a> </h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” title=”Dude, Where’s My Data? Demystifying Biometrics” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Daltrey-Sekuro-Demystifying-Biometrics-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” rel=”noopener”> Dude, Where’s My Data? Demystifying Biometrics </a> </h3> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” title=”ChatGPT: Weighing …

Read More →
AI

ChatGPT: Weighing the Benefits and Risks in Cyber Security

While ChatGPT can benefit the cybersecurity industry by increasing #efficiency, improving threat detection, and automating responses, it is not without risks.

Read More →
Business Resilience

8 Cyber Security Steps to Achieve Business Productivity For Remote Workers

With the rise of remote and hybrid workforce, here are the 8 cyber security steps organisations can do to support business productivity and protect their remote workers.

Read More →
Business Resilience

Business Resilience is an Infinite Game in a Cyber World

Noel Allnutt, Managing Director at Sekuro, shares his thoughts on what the first month of 2023 has taught us so far and why business resilience should be top of mind.

Read More →

5 Ways to Fall Prey to Phishing Attacks

Phishing scams are a common method that cyber criminals use to exploit vulnerabilities. More than 90 percent of cyber attacks start with a phishing email. Learn 5 common ways people fall prey to phishing attacks.

Read More →
Blog

Full Stack Web Attack RCEME Challenge Walkthrough

Check out this article, as Ka Wing Ho, a Security Consultant within Sekuro RED (our talented Offensive Security Team), does a walkthrough of the Full Stack Web Attack RCEME Challenge.

Read More →
Business Resilience

Board vs C-suite: How to get buy-in to manage increased cyber security risk

Today’s cyber risk landscape not only impacts organisations, but also C-suites and boards at a personal level. This article explores how to navigate risk and get the budget you need.

Read More →
AI

The Race for Quantum Supremacy

Quantum computing spells the death knell for conventional encryption. That’s a fact, not speculation, and as the race to build business ready quantum computers hots up, it won’t be long until algorithms like Advanced Encryption Standard (AES) are replaced for a more resilient successor. Even RSA (a public-key cyrtosystem), the basis of many Public Key Infrastructure (PKI) implementations, isn’t safe. RSA relies on it being very difficult to factor large numbers into their prime factors. However, a quantum computer using Shor’s algorithm will factor these numbers significantly faster than classical computers, thus making RSA – and PKI systems – vulnerable to attack. Similarly, AES will be vulnerable to attack using Grover’s algorithm. You’ll find references to both these attack techniques at the end of this blog in case you’re interested. To address this impending reality, researchers are developing quantum-resistant cryptography that relies on a different set of mathematical problems, ones that are difficult for quantum computers to solve. If these new techniques prove successful, and, importantly, implementation is practicable, they will become the new standard for protecting data confidentiality and integrity. Yet while the dream of quantum-resistant cryptography sounds great, in practice there are many challenges  to be overcome, and the question remains: Can we solve these problems in time, since viable commercial quantum computers are drawing ever nearer. It was way back in 1994 when mathematician, Peter Shor, first figured out the algorithm for attacking RSA using a quantum computer, and so the race to find quantum-resistant encryption began. …

Read More
Risk Management

Everything You Need to Know About CPS 230

In this article, #Sekuro’s Managing Consultant Zachary Vella highlights the key changes for regulated entities with the new Prudential Standard CPS 230.

Read More
Cyber Security

Have You Thought About Invoice Fraud Lately?

With the recent news of failing financial institutions, the opportunity for invoice fraud has increased. This article explains what to look out for and the preventative steps you can take.

Read More
AI

Digging Deeper into the Models of Generative AI, and the Threats

Tony Campbell, Sekuro’s Director of Research & Innovation, talks about Generative AI and its potential cyber security threat.

Read More
Brand

Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation

In an increasingly-connected digital world, find out how Brand Trust can be synonymous with digital resilience.

Read More

Sekuro Sydney Office Opening

In early February, the Sekuro team celebrated the Grand Opening of our new Sydney office with a great party with our valued clients, partners and staff!  During the celebration, our Managing Director, Noel Allnutt, welcomed everyone to Sekuro’s new office where our clients, partners, and staff can come together to collaborate, inspire and work towards greater business resilience. Our new office signals the exciting future we see for Sekuro’s business growth. <img width=”800″ height=”1600″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png” alt=”” loading=”lazy” srcset=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-800×1600.png 800w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-150×300.png 150w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery-768×1536.png 768w, https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Sydney-Opening-Blog-Gallery.png 900w” sizes=”(max-width: 800px) 100vw, 800px” /> <h3>More Articles</h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/brand-trust/” target=”_self” title=”Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Sekuro-Brand-Trust-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/brand-trust/” target=”_self” rel=”noopener”> Brand Trust Can Be Eroded By A Single Cyber Breach: Why All Brands Are At Risk From Exploitation </a> </h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” title=”Dude, Where’s My Data? Demystifying Biometrics” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Daltrey-Sekuro-Demystifying-Biometrics-768×400.png” alt=”” loading=”lazy” /></a> <h3> <a href=”https://sekuro.io/daltrey-sekuro-demystifying-biometrics/” target=”_self” rel=”noopener”> Dude, Where’s My Data? Demystifying Biometrics </a> </h3> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” title=”ChatGPT: Weighing the Benefits and Risks in Cyber Security” rel=”noopener”><img width=”768″ height=”400″ src=”https://sekuro.io/wp-content/uploads/2023/02/Version-1-1-768×400.png” alt=”” loading=”lazy” /></a> AI <h3> <a href=”https://sekuro.io/chatgpt-cybersecurity-benefits-and-risks/” target=”_self” rel=”noopener”> ChatGPT: Weighing the Benefits and Risks in Cyber Security </a> </h3> <a href=”https://sekuro.io/8-cybersecurity-steps-to-achieve-business-productivity-for-remote-workers/” target=”_self” aria-label=”Link Complete Box” rel=”noopener”></a> <a href=”https://sekuro.io/8-cybersecurity-steps-to-achieve-business-productivity-for-remote-workers/” target=”_self” title=”8 Cyber Security Steps to Achieve Business Productivity For …

Read More
AI

ChatGPT: Weighing the Benefits and Risks in Cyber Security

While ChatGPT can benefit the cybersecurity industry by increasing #efficiency, improving threat detection, and automating responses, it is not without risks.

Read More
Business Resilience

8 Cyber Security Steps to Achieve Business Productivity For Remote Workers

With the rise of remote and hybrid workforce, here are the 8 cyber security steps organisations can do to support business productivity and protect their remote workers.

Read More
Business Resilience

Business Resilience is an Infinite Game in a Cyber World

Noel Allnutt, Managing Director at Sekuro, shares his thoughts on what the first month of 2023 has taught us so far and why business resilience should be top of mind.

Read More

5 Ways to Fall Prey to Phishing Attacks

Phishing scams are a common method that cyber criminals use to exploit vulnerabilities. More than 90 percent of cyber attacks start with a phishing email. Learn 5 common ways people fall prey to phishing attacks.

Read More
Blog

Full Stack Web Attack RCEME Challenge Walkthrough

Check out this article, as Ka Wing Ho, a Security Consultant within Sekuro RED (our talented Offensive Security Team), does a walkthrough of the Full Stack Web Attack RCEME Challenge.

Read More
Business Resilience

Board vs C-suite: How to get buy-in to manage increased cyber security risk

Today’s cyber risk landscape not only impacts organisations, but also C-suites and boards at a personal level. This article explores how to navigate risk and get the budget you need.

Read More

Already know what you are after?

Get a quick quote from our consultants.

Already know what you are after?

Get a quick quote from our consultants.

Scroll to Top