Information Security

The Treadstone 71 Cyber Intelligence Program

Threat Intelligence Program Development Improve and provide feeds for automation and remediation Security operations Enhance and improve remediation actions Centralize threat intelligence – Intelligence as a Service – Analysis as a Service Drive improvements to risk management Effective Efficient Improve workflow through well-defined roles and responsibilities People, process and technology enhancements Drive the quality improvements of your intelligence Credibility and relevance

Read More

Always On VPN – VyprVPN

What is a VPN and why should you be using one? The Australian Government’s recent data retention law is just the latest attack on online freedom and user privacy throughout the world. As more Governments take steps to spy on and censor its internet users, there is a simple step you can take to protect your online privacy and stop government snooping, and that is by using a VPN service. Using a VPN such as…

Read More

From Trends to Solutions 

May 27–28, 2015    Autoklub České Republiky, Prague 1, Czech Republic The 16th International Conference on Information Security IS2 (Information Security Summit) will be held in Prague, Czech Republic on 27th and 28th May, 2015. Conference is aimed at ICT and ICT security management. The main theme of this conference is: FROM TRENDS TO SOLUTIONS Programme IS2 2015  DEAR MADAM, DEAR SIR, I have, again, the pleasure to offer you the opportunity to meet the…

Read More

Cyber Security 2015 – Skating Away on the Thin Ice of the New Day

2015 is nearly three week young and I am afraid we are going to see more of the same exposures as we did in 2014. Not much has changed in organizations. They are fundamentally following the same tactics and techniques to ‘defend’ against adversaries as they have for the past several years. The CISO still reports to the CIO in most organizations seeing security still as a technical issue. CISOs battle the CIO quietly trying…

Read More