Latest Blog.
Navigating the Labyrinth: The Threat Landscape of Large Language Models and ASCII Art-Based Jailbreaks
|Large Language Models (LLMs) are the new kid on the block and as businesses race to train and utilise these models to gain competitive advantage, red teamers and the usual cyber adversaries are also learning how to exploit them. The sophistication an...
Beyond the Essential Eight (E8) – where to from here?
|As the Australian government moves towards its next phase of the Cyber Security Strategy and consults industry to make legislative reforms, some quiet debate remains within government and industry circles about replacing the nation’s Essential Eig...
The Evolving Threat Landscape of DDoS Attacks: Insights from Macquarie Government's Security Operations Centre
|Within the Security Operations Centre (SOC) at Macquarie Government, we have been witnessing firsthand the transformation of the cybersecurity landscape, particularly the progression of Distributed Denial of Service (DDoS) attacks. Gone are the days ...
Developing Australia’s Defence Industry Base Report
|Today at the National Press Club the Sovereign Australian Prime Alliance (SAPA) launched a new report that sets out the pathway for creating Australian Headquartered businesses and highly skilled jobs in shipbuilding, cyber defence, space, missiles, ...
Team Australia approach needed to win the cyber war
|Aidan Tudehope This article appeared in the Canberra Times on 20 November 2023. The Albanese Government has just released its much-anticipated Australian Cyber Security Strategy 2023-30 (the Strategy), a new national roadmap to put Australia on...
Reducing the risk of supply chain data breaches
|If you are sharing government data with third party service providers, are you certain that information remains secure, even if the sharing is for legitimate government approved purposes? Amid the increased cyber security threats facing Australian...
The UK NCSC 10 Steps and how they compare to the ACSC Essential Eight
|The NCSC “10 Steps to Cyber Resilience” is a set of high-level guidelines developed by the UK’s National Cyber Security Centre (NCSC). It provides organizations with a framework to improve their cybersecurity posture. The 10 Steps cover various...
A turning point in approach to defence
|By Aidan Tudehope The importance of cyber security to Canberra’s and the Australian Defence Force’s capabilities has never been more clear-cut. With the release of the public version of the Defence Strategic Review, which sets the agenda fo...
Podcast: The role of context and evidence in cybersecurity
|Click the above link to hear Corelight’s Jean Schaffer and Macquarie Government’s Catháir Kerr discuss the importance of evidence and context versus raw data in cybersecurity detection and response. In an over thirty year career in US governm...
Macquarie announces general meeting to change its name to Macquarie Technology Group Limited
|Macquarie Technology Group (ASX: MAQ) today announced that it intends to change its listed company name to Macquarie Technology Group, reflecting the company’s evolution to become a digital infrastructure business through its success in cloud infra...