Image
03.12.2024  - 

Zero Trust Consolidation

Saving Money with Zero Trust When considering Zero Trust, cost optimisation is not generally seen as one of its outcomes. Given the definition of Zero Trust as the assumption that […]

25.11.2024  - 

Testing Physical Security

The Importance of Testing Physical Security   In today’s world of sophisticated cyberattacks, organisations often focus heavily on digital defenses, implementing firewalls, antivirus solutions, and multi-factor authentication to safeguard their […]

05.08.2024  - 

The Value of Context

Problem A common theme we encounter during the course of our engagements, is helping clients make the best possible decisions related to risk. Most of the time decisions are made […]

29.07.2024  - 

The Importance of Business Breach Assessments

A Technical Perspective on Cybersecurity Governance In today’s digital landscape, cyber threats are an ever-present concern for organisations of all sizes. With the increasing sophistication of cybercriminals and the evolving […]

09.07.2024  - 

Firewall Reviews – A Better Approach

Introduction   The recent uptick in high severity (and as a consequence, high-visibility) firewall vulnerabilities has brought some attention to the condition of firewalls in many organisations, with those responsible […]

20.09.2023  - 

ASD Essential 8 – Technical or Checkbox Reviews

Introduction   In today’s digital landscape, where cyber threats are ever-evolving, organisations are under constant pressure to ensure the security of their systems and data. The Australian Signals Directorate (ASD) […]

09.07.2024  - 

The Importance of Financial Controls Testing

The Importance of Financial Controls Testing Between July 2022 and January 2024, Victorian Auditor’s General Office (VAGO) uncovered 212 fraud cases¹, including employees and scammers exploiting vendor or supplier financial […]

24.04.2024  - 

Strategising Security: Our Approach to ASD Essential 8 Roadmaps

  Introduction   Given the increasing publicity around the Essential Eight, many organisations may have already undertaken an assessment, and adhere to a particular maturity level. Subsequently, a target maturity […]

09.04.2023  - 

The Resurgence of DNS Information Leakage

DNS Threats   By: Trinity Security Technical Assurance Team   Today’s threat actors are utilising DNS TXT records to gather a comprehensive list of cloud-based service providers used by an […]

18.04.2023  - 

ISM March 2023 Active Directory Controls

The Information Security Manual   By: Trinity Technical Assurance Team   Protecting sensitive information and ensuring the security of IT systems is a top priority for government agencies in Australia. […]