As cyber threats evolve and grow in complexity, so must our defence strategies. One critical tool in our cybersecurity arsenal is conducting regular cyber assessments, which can provide management or the board valuable visibility into their cyber posture. However, an often-overlooked challenge when carrying out internal assessments is the influence of optimism bias. This...
Australia’s first time participating the NATO Cooperative Cyber Defence Centre of Excellence most complex and largest live fire “red” team and “blue” team event.
Employees with authorised access to sensitive information can intentionally or inadvertently leak or steal data. This can include customer data, intellectual property, financial records, or trade secrets, which can lead to reputational damage, financial losses, or legal consequences.