Latest News

A vulnerability scan detects and classifies system weaknesses in computers, networks, and communications equipment. A penetration test, on the other hand, is the practice of testing a computer system, network or web application to identify insecure business processes, poor security settings, or other weaknesses that a hacker could exploit.

Vulnerability scan vs penetration testing

According to Gartner, the public cloud services market grew by 17.5 percent in 2019 ($214.3 billion up from $182.4 billion in 2018).

As cloud investments will continue to surge in the future, organisations would face a big challenge of managing cloud security risks. Here are a few trends that will shape cloud security in 2020:

Cloud Security

The Privasec team consists of information security professionals from all professional and personal backgrounds. We are an inspirational and supportive family who love having a fun place to work and supportive community within which we can grow professionally.

Privasec Hiring

Modern Application program interfaces (APIs) have been providing developers more options to deliver efficient products/services in minimal time. Sources such as ProgrammableWeb provides a great directory to choose from over 15,000 APIs. However, with more data comes more security concerns. Businesses use APIs to connect services and transfer data and a robust API security strategy is key to improving an organisation’s security posture.

Modern API

According to recent studies on cyber trends, ransomware attacks will continue to evolve and pave the way for two- stage extortion attacks: attacking victims with ransomware attacks to extract files and then extorting a ransom by threating to disclose sensitive data.

Ransomware

Privasec Consultant featured in Symes Report

Image Source: The Symes Report - Leadership of our times. (2019) Issue 5.

Just like many other industries, the aviation industry has reaped benefits of substantial digital transformation. But with more digitalisation comes more risk. The Atlantic Council recently published a report regarding aviation cybersecurity, based on a global survey of 244 respondents. In this report, the two main sets of challenges highlighted are: 

  1. Attempt to weave aviation cybersecurity into flight safety, security, and enterprise information technology has proven difficult.
  2. The second challenge is  third-party risk management. There seems to be an issue between suppliers and customers regarding cybersecurity, with many finding it difficult to incorporate best practices into purchases, as well as difficulties in developing consensus on adequate cybersecurity risk management and transparency.

aviation cyber security

If you’re looking for a dynamic, team oriented environment then Privasec might be the right place for you. Career progression is available for the right candidate who is able to demonstrate great work ethic and target attainment.

Sales Development Representative Sydney

Application control treats software as packages and places trust in them for software management, however Application Whitelisting uniquely identifies every file and application as a unique item regardless of which software it belongs to.  

application control vs application whitelisting

Cyber-attacks are inevitable to any business. But during a cyber-attack incident, there is no time to waste. Just like a 911 call, your cyber-security partner should start providing immediate remote support upon notification to assess the gravity of the incident and work to contain it.

incident management cycle

 How prepared is your business to handle a cyber incident or defend against a cyber-attack? Here are your key steps to preparing a robust  incident response capability: