How to integrate ACI and Nutanix for Network Administrators

As a Network Administrator efficiency is key during the deployment phase of any project. Efficiency is one of the benefits that come with integrating ACI and Nutanix along with: Automatic creation of a Subnet in the Nutanix Cluster whenever an EPG is deployed in Cisco ACI. Statistics and Visibility within ACI. Support for intra-EPG policies […]
How to Enable Bad Word Filters on a FortiGate for Schools

As a school IT manager, a school administrator or a teacher, you want to keep your students safe from the dark sides of the internet, that sometimes innocent curiosity can find them in. If your school has installed FortiGate’s for protection from external cyberthreats than you can also use it to protect your students from […]
Starting with the Essentials: A Beginner’s Guide to the Essential Eight

According to the ASD in 2023, the average cost of a cybercrime for small businesses was $46,000, medium businesses $97,200 and large businesses $71,600. With the frequency and sophistication of cybercrimes escalating, it is vital to implement robust security measures to safeguard sensitive information and digital assets. The Australian Signals Directorate (ASD) has developed the […]
Strengthening Government Partnerships: The Essential Benefits of the Home Affairs Hosting Certification Framework

Securing Government Data: The Critical Role of the Hosting Certification Framework In an era where critical technological infrastructure is integral to the functioning of government entities, the security and management of data are of utmost importance. The Department of Home Affairs has recognised the need to safeguard sensitive information and has responded by developing the […]
Tech in Gov Wrap Up

By Ella McAlister Two weeks ago, through Emantra, I had the opportunity to experience exhibiting at Tech in Gov 2024 in Canberra. My experience at the conference was insightful and enjoyable, as we exhibited in partnership with the newly merged Exabeam. Day 1: The first day of Tech in Gov kicked off with enthusiasm and […]
7 reasons all organisations should have compliance at the front of mind

Technology and cyber warfare are evolving at a rapid rate with the development of open access AI and RaaS companies are more vulnerable than ever, and the government is trying to catch up with stricter compliance regulations. The importance of adhering to compliance standards is not just to ensure that you stay out of jail […]
Cyber Awareness Training: A key in the defence against cyber crime

Recently the Commonwealth Bank of Australia (CBA) has warned that they expect a rise in cybercrime to 400% above normal levels this tax season, with much of that targeting employees of small and medium businesses. Defending against cyber-attacks like these has become one of the biggest focuses for Australian business. While protective measures such as […]
Vulnerability scanning: a proactive and preventative approach to cybersecurity

Protecting your business from cyber threats is now more critical than ever. With cybercriminals constantly evolving their tactics to steal or compromise sensitive data, staying ahead of potential vulnerabilities is key. This is where vulnerability scanning comes into play. Vulnerability scanning is a proactive approach to cybersecurity, designed to help you identify and address security […]
Understanding Cyber Maturity Assessments: A Guide to Evaluating and Improving Cybersecurity Posture

1 in 5 organisations believe they are more cyber mature than they actually are. The gap between an organisation’s perception of cybersecurity capability and their actual preparedness is large. This is largely due to the constant evolution of cyber threats across the board from malware to the use of AI in brute force attacks. This […]
Improving your Cybersecurity with 24/7 Monitoring: A Comprehensive Review

In today’s rapidly growing digital environments, across on-premises and cloud vendors, safeguarding your business against cyber threats requires a more proactive approach. As more businesses become victims of cybersecurity attacks, it’s increasingly evident that prioritising a proactive cybersecurity strategy is paramount to avoiding large cybersecurity incidents and the following brand-damage. Unlike reactive measures, proactive strategies […]