Cybersecurity articles

Explore a featured selection of my writing work below.

Data Breaches: Preventive and Responsive Strategies for SMEs

In Australia, small and medium-sized businesses (SMBs) are increasingly finding themselves under attack from cybercriminals and falling victim to data breaches. From ransomware attacks to phishing schemes, the Australian market is no stranger to the looming threats of data breaches in cyberspace. In 2022/2023, the Australian Signals Directorate saw nearly 94,000 cybercrime reports, up 23%. So, in this guide, let’s aim to:

Data breaches, defined as unauthorised access to, or disclosure of, perso

SMEs and the Rising Tide of Ransomware and Targeted Cyber Attacks

Ransomware is a cybersecurity threat involving attackers encrypting information on a system and demanding a ransom for a decryption key. Attackers have developed this attack method further to involve double extortion, where they not only steal data and move it to a different location but also threaten to release it if the company doesn’t pay the ransom.

With the rise of Ransomware as a Service (RaaS), it has become much easier for attackers to launch and maintain ransomware campaigns without de

Why Context Is King: Cloud Security with Comprehensive Visibility

Cloud adoption is essential for organizations looking to deliver cutting-edge customer experiences through digital transformation. However, as you move your digital assets to the cloud, the risk levels that you manage increase significantly. While your cloud provider is responsible for the security of the cloud, your organization is responsible for security in the cloud. This means that organizations today must monitor a vast array of resources and configurations in their cloud environment.

But

Embracing Holistic Cloud Security: Achieving Automated, Continuous Compliance

As more organizations migrate their operations to the cloud, they also find themselves dealing with the complexities of the modern cloud security landscape. Cloud identity and access management(IAM), object storage, and API keys can be tricky to navigate, and misconfigurations prove to be expensive. Expert insights cloud statistics reveal that 80% of businesses experienced a cloud security incident in the past year alone, with average data breach costs reaching a staggering US$3.8 million. Finan

What is CIS Benchmarks? - CIS Benchmarks Explained - AWS

Tools such as the CIS Benchmarks are important because they outline security best practices, developed by security professionals and subject matter experts, for deploying over 25 different vendor products. These best practices are a good starting point for creating a new product or service deployment plan or for verifying that existing deployments are secure.

When you implement CIS Benchmarks, you can better secure your legacy systems against common and emerging risks by taking steps such as th

Microsoft report on Russian cyber attacks on Ukraine

Microsoft detected destructive cyberattacks against Ukraine and released a special report on April 27, 2022, titled “Special Report: Ukraine.” DHS warns Ukraine invasion Russian cyberattack frequency may increase and potentially become even more aggressive. Cyber threat actors have already caused significant damage and may exploit any number of vulnerabilities that either already existed or emerged as a consequence of recent cyber onslaughts.

Numerous global news and social media outlets are in