Cyber Security and Business Resilience Blog
Welcome to the Sekuro blog, your go-to destination for cyber security and business resilience insights!
Stay ahead of the hackers
With Sekuro, you can rest assured that your business is protected from the sneaky cyber criminals. Our team of experts will help you take a strategic approach to cyber security risk mitigation, so you can stay one step ahead of those mischievous hackers.
Transform digitally, without the drama
We believe that digital transformation should be exciting, not scary. With Sekuro by your side, you can confidently navigate the digital landscape and embrace new technologies without risking your business’s security. Let us show you how to transform with resilience!
Insights that will make you think
Our Cyber Security and Business Resilience Blog is jam-packed with eye-opening articles and practical tips that will leave you thinking! From understanding the latest threats to implementing robust security measures, we’ve got you covered.
No jargon or tech mumbo-jumbo
We know that cyber security can be a complex topic, but we promise to keep it simple. Our blog posts are written in plain English (no tech mumbo-jumbo here!) so that everyone, regardless of their technical background, can benefit from our insights.
The Crucial Role of Regular Optimisation Reviews: A Security Engineer’s Perspective
Optimise your security tools for maximum protection of your data, infrastructure, and reputation effectively.
PCI SSS Compliance Pitfalls: Insights from a PCI SSF Assessor
By Gunawan Ang, PCI SSF Assessor Introduction In 2019, the Payment Card Industry Security Standards Council (PCI SSC) issued the PCI Software Security Framework which contains two standards: the PCI
The 2024 Budget Elevates Australia’s Security Game But Fails to Fully Align with the Government’s Six Shields Strategy
Within the last 12 months, the Australian Government has announced significant strategies and initiatives to modernise and progress Australian Society. For the cyber security world, the most important of these was
Assessing Cyber Security Maturity with the AESCSF
In an era where the cyber threat landscape is constantly evolving, robust cyber security measures are non-negotiable for all industries. However, nowhere is the need more acute than in the
Privacy Awareness Week 2024 – Where Are the 116 Proposals to Change the Privacy Act Today?
What Happened? At the occasion of Privacy Awareness Week 2024, we thought it would be interesting to follow up on the Australia AG’s Privacy Act Review Report’s 116 recommended changes to
ISO Goes Green: What You Need to Know About the Climate Change Addition to ISO Standards
On 23 February 2024, the International Organisation for Standardization (ISO) passed a resolution to add two new statements on climate change to several existing management systems standards.
Emerging Threat: AI vs. Human Deceit
In today’s digital world, phishing has taken on a new form that blends human tricks with advanced technology. It’s not just about old-fashioned deception anymore. We’re witnessing a blend of
UK Data Protection Bill vs. EU GDPR
Discover the differences between the UK Data Protection Bill and EU GDPR for Australian organisations handling European citizens’ data.
Jeremy Araullo – Netskope Certified Cloud Security Architect
Sekuro is proud to recognise Jeremy’s success in achieving his Netskope Certified Cloud Security Architect certification.
The Adversarial Mindset: Think Like Your Attacker
The Adversarial Mindset: Think like your adversary with Sekuro. Fortify defenses, enhance threat modeling, incident response, Zero Trust.
Secure Data Hosting for Service Providers with the Hosting Certification Framework (HCF)
An Introduction to the HCF As the Australian Government’s vision to establish six cyber shields to uplift Australia’s security posture progresses, the Government’s frameworks will play a key role in
Application Control and Its Relevance in 2024
Find out the significance of application control in 2024 cyber security strategies, and how it enhances defenses against evolving threats and streamlines incident response.