COVID-19 AND YOUR CYBERSECURITY
  •   Login
  •   Register
  info@securitycolony.com  
Like a Security Team in your back pocket
  • Home
  • Features
    • Resource Library
    • Vendor Risk Scoring
    • Maturity Assessment
  • Pricing
  • About Us
  • Blog

Recent news/blogs

30

Jan
2018

Malicious Memes

The content of this article was also presented by Sam at the 2016 Unrest Conference. In the past, allowing clients…

Google Chrome — Default Search Engine Vulnerability

Introduction In December 2015, Hivint’s Technical Security Specialist — Taran Dhillon — discovered a vulnerability in Google Chrome and the Chromium browser that allows…

23

Jan
2018

09

Jan
2018

CryptoWall — Analysis and Behaviours

Key Behaviours of CryptoWall v4 This document details some initial research undertaken by Hivint into the newly released CryptoWall version…

Secure Coding in an Agile World: If The Slipper Fits, Wear It

Combining agile software development concepts in an increasingly cyber-security conscious world is a challenging hurdle for many organisations. We initially…

02

Jan
2018

26

Dec
2017

The Cyber Security Ecosystem: Collaborate or Collaborate. It’s your choice.

As cyber security as a field has grown in scope and influence, it has effectively become an ‘ecosystem’ of multiple…

An Elephant in Ballet Slippers? Bringing Agility To Cyber Security

As enterprise IT and development teams embrace Agile concepts more and more, we are seeing an increased need for cyber…

19

Dec
2017

12

Dec
2017

Maturing Organisational Security and Security Service Catalogues

One of the key objectives for an information security professional is providing assurance that the systems which are implemented, or…

Security Collaboration — The Problem and Our Solution

Colleagues, the way we are currently approaching information security is broken. This is especially true with regard to the way…

12

Dec
2017

11

Sep
2017

Hivint’s 2016–17 Tech Year in Review

Over the course of the 2016–17 financial year, Hivint completed 117 technical security assessments ranging from source code reviews through…

Hivint in the Telstra Business Awards

Hivint entered the Telstra Business Awards in early 2017, and after a rigorous selection process, won the Victorian New Business…

02

Aug
2017

13

Jun
2017

An analysis of the current cyber threat landscape

Over the last few years, it appears that although certain industries are targeted by cyber attacks more than others, the…

Cybersecurity Collaboration

Establishing a security Community of Interest Hivint is all about security collaboration. We believe that organisations can’t afford to solve security…

02

Jun
2017

28

Mar
2017

jobactive Case Study

Meeting the jobactive security compliance requirements Hivint has been involved with the jobactive program since early 2015, initially undertaking the…

Vendor Risk Assessment Tool

Our new addition to the Security Colony Portal. Security Colony has released its “Vendor Risk Assessment” (VRA) tool, developed in…

01

Mar
2017

18

Feb
2017

SecMetrics

If we are going to measure security, what exactly are we measuring? If you can’t measure it, you can’t manage…

Breach Disclosure

Introduction of mandatory breach disclosure laws [embed]https://www.youtube.com/watch?v=2kVRhUj-wyg[/embed] After several long years gestating through the lower and upper house, the Australian…

14

Feb
2017

13

Feb
2017

Top 4 Expands to Essential 8

A week or two back, the Australian Signals Directorate (ASD) replaced their “Top 4 Mitigation Strategies” with a twice-the-fun version…

Voicemail and VOIP

Commonly overlooked security risks Introduction Every company has a phone system of some type, and just like with smartphones, these systems…

08

Feb
2017

01

Feb
2017

The World Today

I originally wrote this message to try and give some perspective and comfort to the very diverse team within Hivint.…

Joining the Hive

Insights into the cyber-security industry from some of Hivint’s junior bees While tertiary institutions around Australia are striving to produce an…

31

Jan
2017

24

Jan
2017

How does one spark an interest in cyber security among high school girls?

Hivint Security Consultant Esther Lim describes her experiences running a workshop for a group of female high school students on…

Australia’s Cyber Security Strategy — The Pixie Dust We Need?

Boom! And there we have it, the first reasonably coherent cyber security strategy for the country in almost 7 years.…

24

Jan
2017

24

Jan
2017

The Growth of the Business Email Scams Threat

In the last year, there has been a trend towards the commission of payment scams that target employees of companies…

The Cloud Security Challenge

As the use of cloud services continues to grow, it’s generally well accepted that in most cases reputable service providers…

24

Jan
2017

    Australia
    Level 11, 309 George Street
    Sydney, NSW 2000

Useful Links

  • Resource Library
  • Vendor Risk Scoring
  • FAQs
  • About Us
  • Blog

Popular Topics

Cyber Security Industry Security Strategy Uncategorized Vulnerability Research Working in Hivint

Recent Articles

  • Malicious Memes January 30, 2018
  • Google Chrome — Default Search Engine Vulnerability January 23, 2018
  • CryptoWall — Analysis and Behaviours January 9, 2018
  • Secure Coding in an Agile World: If The Slipper Fits, Wear It January 2, 2018
  • The Cyber Security Ecosystem: Collaborate or Collaborate. It’s your choice. December 26, 2017
Copyright © 2021 Security Colony. Terms of Use
Scroll