Latest Blog.
Media Release: Joining the VMware by Broadcom Sovereign Cloud initiative
|2 August 2022, Macquarie Technology Group (ASX: MAQ) today became a member of the VMware by Broadcom Sovereign Cloud initiative, a reflection of the company’s decade-long commitment to sovereign IT capability. The growing importance of data soverei...
Essential 8 Maturity Model
|ACSC cyber security mitigation strategies. The Australian Cyber Security Centre (ACSC) is the Australian Government’s lead agency for cyber security. From experience of cyber security incidents and through vulnerability testing of various governmen...
Essential 8 Cyber Security Guidelines
|What are the Essential 8? The Essential Eight are key cyber security strategies developed by the federal government’s Australian Cyber Security Centre (ACSC) and help mitigate against cyber security threats. The ACSC Essential Eight is designed to ...
Radio Interview: One year on in cybersecurity
|Macquarie Technology Group Senior Advisor Major General (retired) Dr Marcus Thompson AM PhD speaks with ABC Canberra’s Adam Shirley about the changes in Australia’s cybersecurity threat landscape and readiness in the year since he retired from hi...
Top things you need to know about Data Sovereignty
|What is data sovereignty? Data has become the most valuable asset globally, and who controls it is of increasing importance to governments, corporations and individuals alike. Data sovereignty is key to data security, but ‘what is data sovereignty?...
The role of Government cyber security
|Cyber security is of critical importance to corporations and governments alike, and both must protect their IT infrastructure, systems and data from cyber-attacks. However, this is where the similarities between corporate and government cyber securit...
New Cyber Hub programs
|On 1 November 2021, the Digital Transformation Agency (DTA) and Australian Cyber Security Centre (ACSC) jointly announced the government’s new Cyber Hub programs. As the delivery mechanism of the Hardening Government IT (HGIT) initiative, establish...
Government SOC: Why is it essential to Government agencies?
|A Security Operations Centre (SOC) is an essential component of every Government agency’s cybersecurity effort. A SOC monitors an agency’s IT environment for suspicious events, detecting and responding to threats and attacks. Government SOCs also...
Investing in a local Cyber security capability for Victoria’s Government
|According to the Australian Cyber Security Centre’s latest Annual Cyber Threat Report, State governments reported the second-highest number of cyber security incidents; our police force, hospitals, schools and all agencies delivering critical servi...
How NSW Government Agencies can meet Essential 8
|The ACSC “Essential 8” is a set of IT strategies to establish baseline protection against cyber threats. Essential 8 cyber security is only the minimum subset of the ACSC’s Strategies to Mitigate Cyber Security Incidents – hence the “Essent...