• Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Thycotic
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us
  • Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Thycotic
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us
  • Products
    • Level Blue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Level Blue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera (Formerly PCYSYS)
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Pentera (Formerly PCYSYS)
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Delinea (Formerly Thycotic)
    • Webroot
    • KnowBe4
    • ZScaler
    • Thales Safenet
    • Delinea (Formerly Thycotic)
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions

    Solutions

    Network Security

    Endpoint Security

    Cloud Security

    Email & Data Security

    Identity & Access Management

    Security Operations

    Security Awareness & Best Practices

    • Network Security
      • DNS Security
      • Next Generation Firewalls
      • SD-WAN
      • Secure Web Gateway
      • Load Balancing
      • Web Application Firewall (WAF)
      • SASE (Secure Access Service Edge)
    • Endpoint Security
      • Endpoint Protection
      • Mobile / EDR (Endpoint Detection and Response)
      • Application Whitelisting
      • Patch Management
    • Cloud Security
      • CASB (Cloud Access Security Broker)
      • SASE (also fits here)
    • Email & Data Security
      • Email Security
      • Encryption
      • Data Loss Prevention (DLP)
      • Archiving
    • Identity & Access Management
      • Multi-Factor Authentication (MFA)
      • Privileged Access Management (PAM)
    • Security Operations
      • Security Information and Event Management (SIEM)
      • Security Orchestration, Automation, and Response (SOAR)
      • Automated Penetration Testing
    • Security Awareness & Best Practices
      • Security Awareness Training
      • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)
    • Network Security
      • DNS Security
      • Next Generation Firewalls
      • SD-WAN
      • Secure Web Gateway
      • Load Balancing
      • Web Application Firewall (WAF)
      • SASE (Secure Access Service Edge)
    • Endpoint Security
      • Endpoint Protection
      • Mobile / EDR (Endpoint Detection and Response)
      • Application Whitelisting
      • Patch Management
    • Cloud Security
      • CASB (Cloud Access Security Broker)
      • SASE (also fits here)
    • Email & Data Security
      • Email Security
      • Encryption
      • Data Loss Prevention (DLP)
      • Archiving
    • Identity & Access Management
      • Multi-Factor Authentication (MFA)
      • Privileged Access Management (PAM)
    • Security Operations
      • Security Information and Event Management (SIEM)
      • Security Orchestration, Automation, and Response (SOAR)
      • Automated Penetration Testing
    • Security Awareness & Best Practices
      • Security Awareness Training
      • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)

    Business Challenges

    • DNS Security
    • Next Generation Firewalls
    • SD-WAN
    • SASE (Secure Access Service Edge)
    • Secure Web Gateway
    • Load Balancing
    • Web Application Firewall (WAF)
    • DNS Security
    • Next Generation Firewalls
    • SD-WAN
    • SASE (Secure Access Service Edge)
    • Secure Web Gateway
    • Load Balancing
    • Web Application Firewall (WAF)
    • Endpoint Protection
    • Mobile / EDR (Endpoint Detection and Response)
    • Application Whitelisting
    • Patch Management
    • Endpoint Protection
    • Mobile / EDR (Endpoint Detection and Response)
    • Application Whitelisting
    • Patch Management
    • CASB (Cloud Access Security Broker)
    • SASE
    • CASB (Cloud Access Security Broker)
    • SASE
    • Email Security
    • Encryption
    • Data Loss Prevention (DLP)
    • Archiving
    • Email Security
    • Encryption
    • Data Loss Prevention (DLP)
    • Archiving
    • Multi-Factor Authentication (MFA)
    • Privileged Access Management (PAM)
    • Multi-Factor Authentication (MFA)
    • Privileged Access Management (PAM)
    • Security Information and Event Management (SIEM)
    • Security Orchestration, Automation, and Response (SOAR)
    • Automated Penetration Testing
    • Security Information and Event Management (SIEM)
    • Security Orchestration, Automation, and Response (SOAR)
    • Automated Penetration Testing
    • Security Awareness Training
    • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)
    • Security Awareness Training
    • Essential 8 (Australian Cyber Security Centre’s framework – covers multiple categories like patching, MFA, etc.)

    Digital Transformation

    Digital Transformation

    Digital Transformation

    Digital Transformation

    Industry Focus

  • Company

    The Sécurité difference for best in class cyber security

    • About Us
    • Why Us
    • Certifications
    • About Us
    • Why Us
    • Certifications

    Platform Partnership

    • AWS
    • Google Cloud
    • Microsoft
    • Salesforce
  • News
  • Resources
Contact Us
Oct 08

What are SSL Certificates and Why do I Need Them?

SSL certificates are an essential component of the data encryption process that make internet transactions secure. They are digital passports that provide authentication to protect the confidentiality and integrity of website communication with browsers.The SSL certificate's job is to initiate secure sessions with the user’s browser via the secure sockets... read more →
  • October 8, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Oct 08

Microsoft outage highlights true cost of free authentication

This past Monday, some Microsoft services including Outlook email services, O365, and Teams collaboration suite experienced a prolonged outage, lasting up to 6 hours in some cases. While the exact cause is still to be confirmed, Microsoft has cited “authentication issues” and “configuration change in the back end”. Users attempting to log... read more →
  • October 8, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Oct 08

Did you know phishing is still the #1 threat action and is used in social media related attacks?

Many of your users are active on Facebook, LinkedIn, Instagram and Twitter. The bad guys use these platforms to scrape profile information of your users and organisation to create targeted spear phishing campaigns in an attempt to hijack accounts, damage your organization's reputation, or gain access to your network and... read more →
  • October 8, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Sep 08

Securite Newsletter September 2020

Newsletter: 8 September 2020 Essential 8 compliance needed for government business Hot areas: Application Control / Staff awareness training / Incident response We have recently been working with many clients who gain mandates and work with Government departments and government enterprises. Increasingly they are being asked to demonstrate their compliance... read more →
  • September 8, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Aug 20

Airlock Digital podcast

https://risky.biz/RB595/ This week’s show is brought to you by Airlock Digital. They make allowlist/safelist software that is actually manageable at scale! David Cottingham, an Airlock co-founder, joins the show this week to talk through a few product updates.
  • August 20, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Aug 18

Why Security Awareness Training? Ransomware, That’s Why.

Let Securite show you how to make sure your employees understand the mechanisms of spam, phishing, spear phishing, malware, ransomware and social engineering and can apply this knowledge in their day-to-day job. Old school Security Awareness Training doesn’t hack it anymore. Today, your employees are frequently exposed to sophisticated phishing... read more →
  • August 18, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Aug 11

Essential 8 – Application Whitelisting leader Airlock Digital. Free Webinar August 12. 12pm Sydney time.

Gartner PeerInsights recently said of Airlock:"Why Aren't More People Talking About These Guys?" "Airlock has been a critical part of our information security journey. Its ability to provide out of the box application whitelisting to any endpoint, anywhere in the world without relying on network connections or domain joined systems... read more →
  • August 11, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Aug 07

Join us for a free Webinar with Airlock Digital, the leader in Application Whitelisting. Harden your Essential 8 risk posture.

August 12, 2020 12pm EST https://us02web.zoom.us/meeting/register/tZEqfu2vqjojGNCPam6bZXYAkTi5M-oLQ4IE Airlock enables you to easily create and manage secure whitelists in dynamically changing computing environments.Unlike signature based file blocking (black listing) such as antivirus, Airlock only allows files it has been instructed to trust, to run. If the file is not in the whitelist it... read more →
  • August 7, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Aug 07

Australia’s Cyber Security Strategy 2020

​On 6 August 2020, the Australian Government released Australia’s Cyber Security Strategy 2020 (3MB PDF). The Australian Cyber Security Strategy 2020 will invest $1.67 billion over 10 years to achieve our vision of creating a more secure online world for Australians, their businesses and the essential services upon which we all... read more →
  • August 7, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
Jul 27

https://mailchi.mp/emtdist/are-you-complying-with-your-cyber-security-requirements-12473920
  • July 27, 2020
  • Jack Drewe
  • No Comments
  • Uncategorized
  • 1
  • 2
  • 3
  • ...
  • 5

Next Page »

Archives

  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020

Our Partners

  • Products
    • LevelBlue (Formerly AT & T)
    • Abnormal Security
    • Airlock Digital
    • Check Point
    • Cisco Systems
    • Forcepoint
    • Imperva
    • Kemp Technologies
    • Malwarebytes
    • Mimecast
    • Pentera
    • Proofpoint
    • Palo Alto Networks
    • SentinelOne
    • Sophos
    • Thales Safenet
    • Thycotic
    • Webroot
    • KnowBe4
    • ZScaler
  • Solutions
    • Application Whitelisting
    • Automated Pen Testing
    • Archiving
    • Cloud Access Security CASB
    • Data Loss Prevention
    • DNS Security
    • Email Security
    • Encryption
    • Endpoint Protection
    • Essential 8
    • Load Balancing
    • Mobile / EDR
    • Multi-Factor Authentication
    • Next Generation Firewalls
    • Patch Management
    • Privileged Access Management
    • SD WAN
    • Security Awareness Training
    • Security Incident Event Management SIEM
    • Security Orchestration SOAR
    • Web Application Firewall
    • Web Security Gateway
  • News
  • Resources
  • About Us