Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Learning from Equifax – Possibly the Worst Data Breach Ever
    On a scale of 1 to ten this is an 11. The breach of 143million personal credit records from US credit reporting company Equifax is not the biggest breach ever – but in terms of sensitivity of personal data it’s right up there as possibly the worst cyber security data breach in history. Hackers exploited […] The post Learning from Equifax – Possibly the Worst Data Breach Ever appeared first on Cybe...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Cyber Pirates are on the Horizon – Only a Proactive Security Strategy Blows Them out of the Water
    Somali Pirates hijacking container ships for ransom on the high seas were a massive threat barely half a decade ago. It was so shocking that three or four people in wooden boats with AK47s could overrun giant container ships they even made a movie about it starring Tom Hanks (Captain Philips). Today piracy off the […] The post Cyber Pirates are on the Horizon – Only a Proactive Security Strategy B...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Staying in Control During a Cyber Crisis – Why Forensic Thinking and Clear Communication Matters
    Increasingly cyber incidents warrant the need to declare a major corporate crisis which plays out in public. Data breach, cyber attack, ransomware attack or even during fast moving corporate frauds (such as data destruction or IP theft) are examples. This week’s Petya Ransomware worm attacks – combining ransomware with worm capabilities – offers another example. […] The post Staying in Control Dur...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Australia’s Data Breach Notification Law – The Basics You Need To Know
    Historically there has been little motivation for Australian organisations to publicly disclose security incidents where sensitive personal and private data has been lost or stolen. But that changes in February 2018 when Australia’s new Data Notification Law (‘DNL’) comes into force. The law is intended to protect individuals at risk of harm from a data […] The post Australia’s Data Breach Notific...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • The Need for Forensic Capability during a Cyber Incident/Crisis
    Many situations can warrant the need to declare a major corporate crisis. Data Breach, Cyber Attack or even during fast moving corporate fraud (such as data destruction, financially motivated fraud or espionage) are some examples. Businesses learn very quickly that they are often unprepared to investigate and manage these incidents well. They are unable to […] The post The Need for Forensic Capabi...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Massive WannaCry Ransomware Attack – What your Business Needs to Know to Protect Yourself
    The rapid spread of the WannaCry virus at the weekend shows how important it is to keep up to date with security patches as soon as they come out – not sit on them and update. Gone are the days of patching a few times a year. On Friday the world was hit by malicious […] The post Massive WannaCry Ransomware Attack – What your Business Needs to Know to Protect Yourself appeared first on Cyber Resear...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Demystifying Cyber Security (Part 2)
      Five Urgent Things to Do about Cyber Security Cyber risk is not just an IT issue – it is a Board, Executive and whole of enterprise issue – and it cannot be ignored.  It takes time, involvement and investment to strengthen your company’s defences against cyber security risks. The Executive and Board need to […] The post Demystifying Cyber Security (Part 2) appeared first on Cyber Research.
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Demystifying Cyber Security (Part 1)
    What is Cyber Security? Cyber security is the combination of systems, people, applications, and internal controls used to safeguard the confidentiality, integrity, and availability of information. Cyber security is intertwined with the physical security of assets — from computers, networks, and their infrastructure to the environment and people using and surrounding these systems. Cybersecurity th...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Using Machine Learning to detect Insider Threats – Darktrace
    Recently, Cyber Research NZ and Australia staff and customers attended BlackHat Asia 2016 in Singapore. I have attended many of the BlackHat events in the past, in my quest to continually build knowledge, stay up to date with threats, find talent and most importantly study the latest security products that influence our ability to deliver […] The post Using Machine Learning to detect Insider Threa...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • The Three Most Important Things in Australia’s Cyber Strategy for Business
    Australia has a new cyber security strategy. Whilst news headlines are all about how Australia is ready to launch cyber counter strikes against foreign foes that threaten it and shut down hacker ‘safe havens’, drop down to Paragraph 13 of the summary on the Prime Minister’s website and you’ll find the three most compelling issues […] The post The Three Most Important Things in Australia’s Cyber St...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Security Incident Management
    Cyber Research Senior Consultant Ian Hughes discusses Security Incident Management in his latest Linkedin Blog Post. You can read it here: Security Incident Management The post Security Incident Management appeared first on Cyber Research.
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Information Security Basics for Business (Part 3)
    In his series of posts that cover the basics of information security Cyber Research Senior Security Consultant Ian Hughes has now outlined some of the common strategies and controls that can be used to provide good brand information security coverage. Read part 3 of information security basics here: https://www.linkedin.com/pulse/informathttps://www.linkedin.com/pulse/information-security-basics-b...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • The Need for Forensic Capability during a Cyber Incident/Crisis
    Many situations can warrant the need to declare a major corporate crisis. Data Breach, Cyber Attack or even during fast moving corporate fraud (such as data destruction, financially motivated fraud or espionage) are some examples. Businesses learn very quickly that they are often unprepared to investigate and manage these incidents well. They are unable to […] The post The Need for Forensic Capabi...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Massive WannaCry Ransomware Attack – What your Business Needs to Know to Protect Yourself
    The rapid spread of the WannaCry virus at the weekend shows how important it is to keep up to date with security patches as soon as they come out – not sit on them and update. Gone are the days of patching a few times a year. On Friday the world was hit by malicious […] The post Massive WannaCry Ransomware Attack – What your Business Needs to Know to Protect Yourself appeared first on Cyber Resear...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Demystifying Cyber Security (Part 2)
      Five Urgent Things to Do about Cyber Security Cyber risk is not just an IT issue – it is a Board, Executive and whole of enterprise issue – and it cannot be ignored.  It takes time, involvement and investment to strengthen your company’s defences against cyber security risks. The Executive and Board need to […] The post Demystifying Cyber Security (Part 2) appeared first on Cyber Research.
Cyber Research Ltd
Cyber Research Ltd
Blog Post

New blog articles detected.

  • Demystifying Cyber Security (Part 1)
    What is Cyber Security? Cyber security is the combination of systems, people, applications, and internal controls used to safeguard the confidentiality, integrity, and availability of information. Cyber security is intertwined with the physical security of assets — from computers, networks, and their infrastructure to the environment and people using and surrounding these systems. Cybersecurity th...
Cyber Research Ltd
Cyber Research Ltd
Blog Post

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.