FEATURED POST
Cyber Presilience® – The Human-Centric Approach to Cyber Security
The ground-breaking concept called Cyber Presilience® takes a human-centric approach to cybersecurity. By integrating people, processes, and technology, Cyber Presilience® aims to build a robust cybersecurity defence strategy tailored to each organisation’s unique needs.
Recap of the “Active Attacks: What We Must Do Now” Webinar
Recap of the “Active Attacks: What We Must Do Now” Webinar Events - Risk 2 Solution Group | Published 18 April 2024
SoCI 2024. Where Are We Now?
On behalf of the entire team at Risk 2 Solution, we want to extend our heartfelt thanks for your participation
Ensuring Critical Infrastructure Cyber security by August 2024 – What Are Our Chances?
In recent weeks, the US Department of Homeland Security's CISA (Cybersecurity and Infrastructure Security Agency) reported a breach in its own systems. CISA, in collaboration with the Australian Signals Directorate's Cybersecurity Centre and the National Cyber Security Centres of the UK, Canada, and New Zealand, issued an advisory at the end of February. The breach occurred due to a remote access exploitation vulnerability in the Ivanti Connect Secure and Ivanti Policy Secure Gateways, systems designed to protect CISA.
Making Risk and Security Work for You and Your Organisation – Turn Risk to Opportunity
Beyond Resilience: The Essential Role of Presilience CISO Services in Fortifying SMEs Against Cyber Threats
In the current digital era, the stakes for businesses, especially small to mid-sized enterprises (SMEs) in Australia, have never been higher when it comes
Cyber Presilience® – The Human-Centric Approach to Cyber Security
An engaged workforce is undoubtedly the strongest layer in a cyber defence strategy. In the battle of usability vs security, usability will always win, unless the individual 'why' is connected to the organisational 'why'.
Critical Infrastructure is Under Attack from Hackers
Why a 'wait and see' approach may prove disastrous for Australia. Earlier this month, Australian security researcher Sick Codes hacked a John Deere 4240 display and installed the vintage 1990s video game DOOM.
Mind Your NQRs – Arming Your Intuition with Non-Judgmental Observation
Mind Your NQRs - Arming Your Intuition with Non-Judgmental ObservationAny violence prevention instructor worth their salt knows that personal safety begins with situational awareness. And
Perceptive Listening: Intelligence Gathering for Conflict Management
Perceptive Listening: Intelligence Gathering for Conflict Management Many years ago, I was teaching a course to healthcare workers which featured a section on Active
Conflict Management for Educators
Conflict Management for Educators When I first discussed the idea of a conflict management course specifically for teachers, my non-teacher friends assumed I’d be