Latest News

Application control treats software as packages and places trust in them for software management, however Application Whitelisting uniquely identifies every file and application as a unique item regardless of which software it belongs to.  

application control vs application whitelisting

Cyber-attacks are inevitable to any business. But during a cyber-attack incident, there is no time to waste. Just like a 911 call, your cyber-security partner should start providing immediate remote support upon notification to assess the gravity of the incident and work to contain it.

incident management cycle

 How prepared is your business to handle a cyber incident or defend against a cyber-attack? Here are your key steps to preparing a robust  incident response capability: 

Just like other businesses, the Australian federal government has undertaken substantial digital transformation in projects such as myGov, Digital Entity,, etc. But with more digitalisation, comes more risk. In recent years, malicious actors have been successfully finding ways to overcome government capabilities. For this reason, Information security has been a top national priority for the Australian government.

IRAP ISM Compliance

Traditionally, the Offenders (Red Team) and Defenders (Blue Team) have been considered two sides of the same security coin. While the Red team emulate an attacker exploiting a vulnerability in an organisation’s systems, the Blue team is responsible for building security controls to defend against the attackers. As both the activities are integral in improving the cyber security posture of a company, an integration between both mindsets is crucial in achieving the desired business objectives. Purple teaming process involves consistent knowledge sharing between both the Red and Blue teams for continuous process improvements:

  • Defence informs the offence about their controls, monitoring and how to respond to the security incidents.
  • Offence on the other hand, informs defence about TPPs (Techniques, Tactics and Procedures). 

Privasec Purple Teaming

Is it possible to calculate the return of investment on cybersecurity controls?

Traditionally, organisations have struggled to calculate the financial losses from cyberattacks/ fraud and prioritise security investments based on Return of investment (ROI). Frameworks such as APRA CPS 234 demand regulated entities to maintain information security capability commensurate with information security vulnerabilities and threats. However, the APRA CPS 234 framework doesn’t provide enough information to articulate cyber risks in financial metrics with which business executives and board are familiar with. FAIR is one framework that helps quantify the risks and measure the expected financial loss due to a cyber attack.

Dollar Value on Cyber Risks

Often, when it comes to security technologies, organisations are forced to accept the “it works, just trust us” marketing copy without ever being able to validate their effectiveness within their own environment. Thus, despite knowing the security flaws, many organisations fail to detect intrusions. Offensive security testing (i.e. Penetration tests or Red Team exercises) pinpoint many security flaws but leave it up to the organisations to fix them alone. None of these tell the IT department how to improve their tools to detect breaches or how to detect them faster. Privasec’s Breach and Attack Simulation on the other hand focuses on helping your organisation to fine tune your tools and processes and trains your SMEs to detect when you are actually under attack.

Purple Teaming copy 

Privasec Team recently sponsored the 2019 RMIA annual conference: the premier risk conference in the Asia Pacific Region from 13th -15th November. The conference featured Risk and Resilience professionals from Asia Pacific region. Privasec’s Principal Consultant, Pablo Borges was on the panel addressing management of cyber risk.

Privasec at RMIA

Privasec Red team has launched the fourth round of Privasec Red Hacking Challenge.

Privasec Red Hacking Challenge Round 3

Privasec Red team has launched the third round of Privasec Red Hacking Challenge.

Privasec Red Hacking Challenge Round 3