Have You Thought About Invoice Fraud Lately?
With the recent news of failing financial institutions, the opportunity for invoice fraud has increased. This article explains what to look out for and the preventative steps you can take.
With the recent news of failing financial institutions, the opportunity for invoice fraud has increased. This article explains what to look out for and the preventative steps you can take.
Taj is a Mixed Martial Arts practitioner and avid gamer of PS titles, Age of Empires. He likes to coach students and professionals in IT & cyber security. He volunteers with NDIS programmes to help neurodivergent clients learn IT/Game Development skills. You can find him in most cyber security communities on Discord or LinkedIn.
Join us as Taj shares his valuable insights and advice for working in the cyber security industry.
Learn more about how a career in cyber security is a rewarding lifestyle and an opportunity for continuous learning.
Ahead of Mental Health Awareness Month in October, Sekuro surveyed 101 cyber security professionals to find out how they’ve been coping over the past two years.
Check out this article as Lee Roebig, our Customer CISO explain the ‘Principle of Least Privilege’, a concept that is widely used in organisational security.
Find out the key takeaways of our CxO Tribe discussion on board metrics, building high-performing teams, cyber business enablement and Zero Trust implementation.
Check out this article as Lee Roebig, our Customer CISO discuss about how people of your organisation can impact your vulnerability when it comes to cyber threats.
Check out this article by Prashant Haldankar, Co-Founder and CISO of Sekuro, as he shares about the evolving role of CISO in 2022 and the secret to being an effective CISO.
Sekuro’s Customer CISO, Lee Roebig expounded on the following aspects of Zero Trust, which are fundamental to the security, and hence, the success of an organisation. Organisations who are on top of their patching processes often spend weeks each month patching urgent vulnerabilities and/or resolving any unforeseen impacts they have on systems. They often complete these …
Whether it is a person, device, object, or connection, Zero Trust is the belief that we should not trust them until they prove they can be trusted. Check out this blogpost as our Customer CISO, Lee Roebig discusses how organisations can implement Zero Trust even with limited resources