Category: Uncategorized
Categories

USB risks in industrial and OT environments
USB devices are everywhere. From flash drives you keep on your keychain, to a tool used to update industrial machinery, these small, convenient gadgets have become part of our daily digital lives. But for all their usefulness, USBs can also be a serious cyber security risk, especially in industrial and operational technology (OT) environments. … Continue reading USB risks in industrial and OT environments

Gamification is the future of cyber security training
As the demand for cyber security training grows, so too must the ways we deliver it. Traditional methods often fall short in capturing attention and driving real engagement. This blog explores how gamification can be a powerful tool to educate, motivate, and inspire lasting behaviour change. By turning routine training into an interactive experience, gamification… Continue reading Gamification is the future of cyber security training

The hidden danger of insider threats in critical infrastructure
When we think of cyber threats, most of us imagine anonymous hackers or overseas attackers targeting systems from afar. But one of the most dangerous risks actually comes from the inside. Insider threats are caused by people within an organisation who are often overlooked, but they can do serious damage, especially in industries that keep… Continue reading The hidden danger of insider threats in critical infrastructure

Meet our OT team: Rhiana Cooke
We’re the OT security specialists, and we want you to get to know our team better. We sat down with Rhiana Cooke, OT Security Architect, to find out more about her OT journey, OT cyber security concerns, and core advice for those interested in getting into the industry. How long you have been… Continue reading Meet our OT team: Rhiana Cooke

Meet our OT team: Bruce Large
We’re the OT security specialists, and we want you to get to know our team better. We sat down with Bruce Large, Principal OT Security Architect and Chief Evangelist, to..

What is ISO 27001?
The ISO 27001 is one of the most well-known standards globally, and plays a crucial role in safeguarding information’s confidentiality, integrity, and availability

A quick guide to addressing unusual activity on OT systems
Noticing unusual activity on operational technology (OT) systems is a serious cause for concern. When spotted, prompt and appropriate actions should be taken to prevent..

NIST SP 800-82 Revision 3 highlights and key differences
The National Institute of Standards and Technology (NIST) has published the final version of Special Publication 800-82 Revision 3. In this blog, we’ll give a high-level overview of the NIST SP 800-82 cyber security framework and look at the core updates and improvements covered in Revision 3, as compared to the previous 2 versions. NIST SP… Continue reading NIST SP 800-82 Revision 3 highlights and key differences

What is NIST-CSF?
The NIST Cyber Security Framework (NIST-CSF) was born out of the need for a standardised approach to cyber security and has evolved into a versatile tool used globally. In this blog, we explore a high-level overview of the NIST-CSF, including its origins and structure. We’ll also explore its application in the Australian critical infrastructure landscape,… Continue reading What is NIST-CSF?

What is the AESCSF?
The Australian Energy Sector Cyber Security Framework (AESCSF) offers a tailored approach to bolstering cyber security for OT environments within Australia’s energy sector. In this blog, we provide an overview of this framework, explore its role in the uplifting security standards in Australian operational technology (OT) systems, as well as potential challenges that organisations may encounter… Continue reading What is the AESCSF?