The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Introduction Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  ...
Why Hack In When You Can Log In

Why Hack In When You Can Log In

The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden...
What in the Cloud?

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services),...
What Makes You Board Ready?

What Makes You Board Ready?

Serving on a corporate board is often seen as the pinnacle of a professional career, the natural, coveted ‘next step’ after decades of climbing the corporate ladder. For many, it is the picture of executives in sharp suits, convening in a high-rise building, and...