Damian Harvey is a key member of the Threat Intelligence team and wears many hats. His role has recently expanded from BDM to Group Head of Sales to acknowledge his active participation in the development and rollout of Evolve Security Automation. Here Damian shares his insights into what drives him daily.
Oct 19, 2018
Threat Intelligence today confirmed its Evolve security automation platform has successfully completed its final round presentation in the inaugural Optus Innovation Challenge program.
Oct 12, 2018
Five finalists have been selected from 85 applications for the Optus inaugural innovation challenge, with the telco praising the high volume of quality startups which participated in the program.
Aug 21, 2018
If you put your printers on the Internet with default passwords and vulnerable software, you’re going to get hacked
Aug 03, 2018
Threat Intelligence launched Evolve, its unified security automation platform.
Aug 01, 2018
Evolve is a new cloud-based all-in-one security automation platform for automated penetration testing, automated security infrastructure orchestration and automated incident response.
Jul 31, 2018
Threat Intelligence announced the launch of Evolve, a new cloud-based security automation platform.
Threat Intelligence would like to draw your attention to the Mandatory Notifiable Data Breach reporting legislation that came into effect today, 22 February 2018, with potential fines of up to $420,000 per individual and up to $1,200,000 for the companies that do not comply.
The pressure is on Australian banks to keep up with customer’s growing use of smartphone apps to pay for in-store and online purchases.
Oct 19, 2017
The flaw in the WPA2 wireless protocol revealed recently has a critical impact on Android phones running version 6.0 of the mobile operating system and Linux devices, a security researcher says.
Oct 18, 2017
Threat Intelligence Expert Provides Insights on the long-term impacts of the KRACK attacks and what organisations should do to protect themselves long-term.
Sept 19, 2017
Fears of hacking are causing an increasing number of SMEs to abandon having a website, opting instead for other forms of internet presence.
Sept 13, 2017
Internet security experts are urging people to update their software to protect against a serious vulnerability, which if exploited could spread uncontrollably via the common wireless technology bluetooth.
Sept 13, 2017
This is the latest in a long list of security flaws, however this is considered to be one of the most dangerous attack vectors that has been released. In fact, with an estimated 8 billion devices potentially affected, it could be the largest ever security flaw to date.
Aug 22, 2017
A hacker who goes by the alias “xerub” has managed to successfully crack Apple’s Secure Enclave firmware decryption key for their iOS devices. The Secure Enclave Processor (SEP) is used by iOS devices to store and manage the encryption keys and authentication process for the device.
Aug 11, 2017
The 20th edition of Black Hat USA (BHUSA) did not disappoint, if your expectations were the largest exhibit floor, the most lasers, and the biggest attendance ever.
We released this brand-new attack technique at Black Hat USA and makes this nightmare a reality by turning your Active Directory Domain Controllers into C&C servers that can then command a powerful internal botnet. This attack technique is a fundamental flaw within the way that nearly every organisation implements their Active Directory solution, which leaves a gaping hole within their security and their ability to contain security breaches.
Aug 2, 2017
Australian information security company Threat Intelligence has revealed details of a new attack technique whereby a Microsoft Windows Active Directory domain controller can be transformed into a command-and-control centre for an internal botnet.
July 24, 2017
Your organization has just discovered a serious data breach.
Australian Government organisations can compromise suspects devices to capture everything that they type; however, what they don’t have, in general, is a reliable way of gaining access to encrypted data when they are unable to compromise the target device. This means that critical information to a Government investigation may exist within the encrypted data, but they simply can’t get access to it to prosecute the perpetrator.
July 14, 2017
For millenia humans have used secret codes to protect messages.
Jun 29, 2017
Actress Mary Elizabeth Winstead thought she was sharing a private moment with her husband, film director Riley Stearns, when she posed for a number of intimate images in her home several years ago.
Jun 28, 2017
Jun 28, 2017
Publisher’s Panel in partnership with Darktrace – Using AI for next-generation Cyber Security | IDG Security Day
Moderated by – Anthony Caruana, CSO
Mark Beaumont, Country Manager Australia,
Darktrace Jonathan Chang, Managing Director, Silverpond Stephe
Jun 22, 2017
The shortest day of the year in the southern hemisphere marked IDG’s first ever Security Day.
May 15, 2017
Australia’s top Cyber Security Adviser says it’s fanciful to suggest governments should create conventions to control cyber warfare.
Jan 23, 2017
A federal government department has been blasted over its “appalling response” to a security researcher’s report which found it has been exposing millions of Australians’ personal information by leaving serious security flaws unchecked in a critical gover.
Jan 14, 2017
Donald Trump has appointed Rudy Giuliani as his cybersecurity advisor, prompting security experts to cast a critical eye over his consulting firm’s website — and they’re not impressed.
Jan 13, 2017
US president-elect Donald Trump’s freshly minted cyber tsar Rudy Giuliani runs a website so insecure that its content management system is five years out of date, unpatched and is utterly hackable.
The cat’s out of the bag for about 60 Australians who thought they could anonymously rent a hacker from a website to do their dirty work.