AUTHOR

Ajay Unni

Stories by Ajay


Threat Hunting & Intelligence

The Threat Intelligence Lifecycle - Explained

Understand the complete threat intelligence lifecycle, from planning to execution and feedback - and know how to do it for your business.

Security Penetration Testing

Why You Need Internal Penetration Testing

Internal networks & applications must be secured against breaches. Here's all you need to know about internal penetration testing & how to get it...

 

Optus has been hit with a major cyber attack

In today’s world businesses around the world as well as in Australia, face increasingly sophisticated and innovative cybercriminals targeting what matters most to them; their money, data and reputation. Download our guide to learn everything you need to know about the Optus Data Breach, as well as the nine steps every business around the world and in Australia needs to take to avoid being next.