Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • From Chaos to Conformance: 4 Context of the organisation
    In my previous two articles in this series focused on developing an Information Security Management System (ISMS) based on ISO 27001:2013, I presented the common myths associated with the standard. In this article, I am going to provide an overview of the standard and section 4 Context of the organisation. As discussed, the ISO 27001 […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • Chris and Michael to Present at COSAC 2017
    Chris and Michael will be presenting at the 24th International Computer Security Symposium & 9th SABSA World Congress, which will be held in Ireland between the 1 – 5 October 2016. The following provides a synopsis of their sessions, visit the COSAC website here for more information and the full conference schedule. 2S Using SABSA […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • From Chaos to Conformance: More ISO 27001 myths
    Okay, I know I promised to delve into and discuss the requirements defined in 4 Context of the organisation. However, I realised that they are other common myths that I should dispel for those of you that are interested in implementing an Information Security Management System (ISMS) that conforms with ISO/IEC 27001:2013 (ISO 27001). Myth […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • BrickerBot kiss of death to IoT devices
    Reports surfaced on the 12th of April of a botnet that attacks IoT running BusyBox and other Linux-based devices. The bot, which is believed to be active since the 20th of March 2017, exploits hard-coded passwords of devices with published SSH or telnet, as well as attempting to brute-force passwords of devices with non-default credentials. […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • “C” is for Controlled Access
    C is for Controlled Access When using devices and online services, always use modern, convenient and strong access controls. Fingerprint sensors are brilliant for controlling access to personal devices, a good password manager makes creating and remembering passwords a breeze, and adding multi-factor authentication is the best approach for protecting the accounts you really care about. This blog [...
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • From Chaos to Conformance: A series on implementing an ISMS
    This is a new blog series on implementing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013 (ISO 27001). This is the first in a series of blog articles aimed at helping organisations understand the value of implementing an Information Security Management System (ISMS) that conforms with ISO/IEC 27001:2013 (ISO 27001). Over the last […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • Remember Your Security ABCs
    There seems to be a lack of memorable security guidance for everyday people who use computing devices and the Internet. Not only that, most of the guidance hasn’t changed in the last 5 to 10 years and typically relates to the complexity of passwords or using anti-virus software. In addition to this, the guidance can often be impractical and prevent the device from being usable, so people just igno...
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • Are you looking for your next career challenge?
    Do you want to join the best small team in Wellington?  Do you have a great project management or coordination and service delivery background? Axenic is currently looking for an Engagement Manager to join our growing team.  This role will be the project interface between our consulting team and our clients.  You will be responsible for […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • Rapid Reaction: Detecting or Reporting Information Security Incidents
    This is the fourth article in a series that aim to help organisations build and maintain their information security incident management and response capability. In the previous article I provided a bird’s eye view of the standard incident handling process. As noted previously, the incident handling process is triggered either by detecting or reporting security […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • We’ve Moved!
    Happy New Year! During the Christmas break we moved to our new office. We are still in the same building, 187 Featherston Street, but are now located on the 4th floor.
  • Rapid Reaction: Incident handling process overview
    This is the third article in a series that aims to help organisations build and maintain their information security incident management and response capability. Before getting “into the weeds” of an incident handling process, it is useful to have a bird’s eye view of what it looks like. In this article I will provide you […]
  • Rapid Reaction: What is a security incident?
    This is the second article in a series that aim to help organisations build and maintain their information security incident management and response capability. In the previous article I introduced the issue of the general deficiency of effective incident management and response processes in many organisations. But what is a security incident? The short answer […]
  • Going to Microsoft’s Ignite 2016 Conference? Check out Chris’s session
    For those folks heading up to Microsoft’s Ignite session in Auckland from the 25th October, check out Chris’ session on Thursday 27th – “A practical approach to security in the cloud”. As a teaser this is the abstract for the session: “Is your organisation or the one that you look after looking to take advantage of […]
  • Rapid Reaction: A Series on Incident Management and Response
    This is the first in a series of articles that aim to help organisations build and maintain their information security incident management and response capability. With the exception of a few organisations, it seems that the effort put into establishing an information security incident management and response capability is limited to developing a documented process. […]
Axenic Ltd
Axenic Ltd
Blog Article

New blog articles detected.

  • Chris to present at COSAC 2016
    Chris will be presenting two sessions at COSAC 2016 held in Ireland between the 2 – 6 October 2016.  The following provides a synopsis of his sessions, visit the COSAC website here for more information and the full conference schedule. 12A Security Service Design Chris Blunt (NZ) We all know that services are comprised of […]

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.