Datasheets – Sense of Security Thu, 19 Dec 2019 05:32:30 +0000 en-US hourly 1 https://wordpress.org/?v=5.3.2 Red Teaming: A technical risk assessment conducted live and real-time. /red-teaming-a-technical-risk-assessment/ /red-teaming-a-technical-risk-assessment/#respond Fri, 06 Dec 2019 05:37:39 +0000 https://pingpongpang.senseofsecurity.com/?p=6704 Get a better understanding of Red Teaming and learn more about what attackers might be most interested in gaining access to in your organisation.

The post Red Teaming: A technical risk assessment conducted live and real-time. appeared first on Sense of Security.

]]>

Red Teaming involves a comprehensive replication of the behaviour of a real cybercriminal. This simulation is conducted via a multilayer approach to security testing that not only exploits vulnerabilities in technology, but also exploits the flaws in people and processes within the organisation and its supply chain.

“Red Teaming” originates from a military terminology with the Red Team being the attackers and the Blue Team being the defenders. This approach simulates more closely how unconstrained real-world attacks take place from key threat actors such as state-sponsored attackers, terrorists, organised crime gangs, corporate spies and other nefarious individuals. Your organisation and any outsourced IT services should be operating as the Blue Team – ideally defeating the attack as it occurs.

The results of such a test will allow you to create an independent, neutral view of the effectiveness of both security controls and the team responsible for

Download the below datasheet and case study to get a better understanding of Red Teaming.

[contact-form-7]

If you have any questions or would like to discuss your security training needs contact us today or call 1300 922 923.

The post Red Teaming: A technical risk assessment conducted live and real-time. appeared first on Sense of Security.

]]>
/red-teaming-a-technical-risk-assessment/feed/ 0
Distributed Denial of Service testing services /distributed-denial-of-service-testing-services/ /distributed-denial-of-service-testing-services/#respond Fri, 06 Dec 2019 05:03:36 +0000 https://pingpongpang.senseofsecurity.com/?p=6700 DDoS is now considered one of the primary threat types facing every industry and business that is exposed to the Internet. Our Data Sheet will give a better understanding of how it affects you.

The post Distributed Denial of Service testing services appeared first on Sense of Security.

]]>

In recent times, Distributed Denial of Service (DDoS) attacks have continued to gain media attention. High profile organisations are coming under attack,
globally, regionally and locally, across the spectrum of Government, large corporates and any entity being hosted on cloud platforms.

Denial of Service attacks have evolved from singlesource (e.g. sending overwhelming volumes of email), which are relatively easily detected and
defeated, to attacks that come from many thousands of compromised agents (bots) acting on behalf of threat actors.

DDoS is now considered one of the primary threat types facing every industry and business that is exposed to the public Internet.

Download the below datasheet and case study to get a better understanding Distributed Denial of Service.

[contact-form-7]

If you have any questions or would like to discuss your security training needs contact us today or call 1300 922 923.

The post Distributed Denial of Service testing services appeared first on Sense of Security.

]]>
/distributed-denial-of-service-testing-services/feed/ 0
Security Awareness Training Program (SATP) /security-awareness-training-program-satp/ /security-awareness-training-program-satp/#respond Thu, 07 Nov 2019 05:32:45 +0000 /?p=6520 We specialise in the development, facilitation and management of a whole-of-business awareness program that will educate your people to better understand the ongoing threat landscape and how security is a shared responsibility, and everyone is accountable.

The post Security Awareness Training Program (SATP) appeared first on Sense of Security.

]]>

The current security threat landscape is replete with aggressive, tenacious and pernicious threats. Today’s attackers are typically highly trained, financially motivated and possibly in the employ of nation states.

Our adversaries tend to have extensive monetary and human resources and the capability to deliver exceptionally well planned, fine-tuned and orchestrated attacks. Motivations now range from political influence, vandalism and theft of customer data and intellectual
property to ransom and extortion on an industrial scale.

A cyberattack can jeopardise operations and create reputational and brand damage, which causes irreparable harm to larger companies and threatens the very existence of smaller ones.

Cyberattacks can also bring public infrastructure to its knees.

Historically, organisations have invested extensively in mitigation through a myriad of hardware and software solutions, that despite their technical capabilities, are not alone adequate to solve the problem. Technology represents only one dimension of the response we can make to manage down cyber risk. We now have extremely capable adversaries who are adapting their techniques to exploit the weakest element in the environment. Invariably, this relates to the most valuable asset in the organisation – its people.

Threats like these require an approach that can meet this challenge and the people to lead and deliver confidence in the face of adversity.

Download the below datasheet and case study to get a better understanding of how Cyber Security Awareness Training can help your organisation.

[contact-form-7]

If you have any questions or would like to discuss your security training needs contact us today or call 1300 922 923.

The post Security Awareness Training Program (SATP) appeared first on Sense of Security.

]]>
/security-awareness-training-program-satp/feed/ 0