Recent news/blogs
Malicious Memes
The content of this article was also presented by Sam at the 2016 Unrest Conference. In the past, allowing clients…
Google Chrome — Default Search Engine Vulnerability
Introduction In December 2015, Hivint’s Technical Security Specialist — Taran Dhillon — discovered a vulnerability in Google Chrome and the Chromium browser that allows…
CryptoWall — Analysis and Behaviours
Key Behaviours of CryptoWall v4 This document details some initial research undertaken by Hivint into the newly released CryptoWall version…
Secure Coding in an Agile World: If The Slipper Fits, Wear It
Combining agile software development concepts in an increasingly cyber-security conscious world is a challenging hurdle for many organisations. We initially…
The Cyber Security Ecosystem: Collaborate or Collaborate. It’s your choice.
As cyber security as a field has grown in scope and influence, it has effectively become an ‘ecosystem’ of multiple…
An Elephant in Ballet Slippers? Bringing Agility To Cyber Security
As enterprise IT and development teams embrace Agile concepts more and more, we are seeing an increased need for cyber…
Maturing Organisational Security and Security Service Catalogues
One of the key objectives for an information security professional is providing assurance that the systems which are implemented, or…
Security Collaboration — The Problem and Our Solution
Colleagues, the way we are currently approaching information security is broken. This is especially true with regard to the way…
Hivint’s 2016–17 Tech Year in Review
Over the course of the 2016–17 financial year, Hivint completed 117 technical security assessments ranging from source code reviews through…
Hivint in the Telstra Business Awards
Hivint entered the Telstra Business Awards in early 2017, and after a rigorous selection process, won the Victorian New Business…
An analysis of the current cyber threat landscape
Over the last few years, it appears that although certain industries are targeted by cyber attacks more than others, the…
Cybersecurity Collaboration
Establishing a security Community of Interest Hivint is all about security collaboration. We believe that organisations can’t afford to solve security…
jobactive Case Study
Meeting the jobactive security compliance requirements Hivint has been involved with the jobactive program since early 2015, initially undertaking the…
Vendor Risk Assessment Tool
Our new addition to the Security Colony Portal. Security Colony has released its “Vendor Risk Assessment” (VRA) tool, developed in…
SecMetrics
If we are going to measure security, what exactly are we measuring? If you can’t measure it, you can’t manage…
Breach Disclosure
Introduction of mandatory breach disclosure laws [embed]https://www.youtube.com/watch?v=2kVRhUj-wyg[/embed] After several long years gestating through the lower and upper house, the Australian…
Top 4 Expands to Essential 8
A week or two back, the Australian Signals Directorate (ASD) replaced their “Top 4 Mitigation Strategies” with a twice-the-fun version…
Voicemail and VOIP
Commonly overlooked security risks Introduction Every company has a phone system of some type, and just like with smartphones, these systems…
The World Today
I originally wrote this message to try and give some perspective and comfort to the very diverse team within Hivint.…
Joining the Hive
Insights into the cyber-security industry from some of Hivint’s junior bees While tertiary institutions around Australia are striving to produce an…
How does one spark an interest in cyber security among high school girls?
Hivint Security Consultant Esther Lim describes her experiences running a workshop for a group of female high school students on…
Australia’s Cyber Security Strategy — The Pixie Dust We Need?
Boom! And there we have it, the first reasonably coherent cyber security strategy for the country in almost 7 years.…
The Growth of the Business Email Scams Threat
In the last year, there has been a trend towards the commission of payment scams that target employees of companies…
The Cloud Security Challenge
As the use of cloud services continues to grow, it’s generally well accepted that in most cases reputable service providers…