Everyone can make a difference in detecting a Cyber Attack – Threat Information gathering

Ask yourself, does your organisation collect threat information? How is this done? And is this information being used positively to assist in the detection and identification of a cyber threat or attack? NIST defines Cyber threat information as…” any information that can help an organization identify, assess, monitor, and respond to cyber threats. Examples of…

Brisbane Cyber Security Roundtable Luncheon

Secure ISS recently hosted a Cyber Security Roundtable in Brisbane.   The event was well attended by organisations in the health, transport, financial services, engineering, mining and technology sectors. The topic for the roundtable discussion was “The changing threat landscape. Mitigation, detection and protection strategies”. The key note speaker was Leon Fouche (National Leader Cyber…

Beyond Trust

BeyondTrust Partners with Secure Internet Storage Solutions to offer First Privileged Access Managed Security Service in Australia

New partnership expands BeyondTrust’s privileged access management and vulnerability management to a broader global base. PHOENIX, July 19, 2017 – BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, announced Secure-ISS Pty Ltd as its first Managed Security Service Provider (MSSP) partner in Australia, providing privileged access management (PAM)…

PETYA Ransomware – Security Bulletin

Petya – Security Update Following on from the recent WannaCry ransomware threat that has swept the globe in the past month, another ransomware threat has escalated globally overnight, including reports of Australian companies being affected. How The Petya Threat Works Similarly to the WannaCry outbreak, Petya is generally distributed via url links emailed to users,…