Insights Hub

Security Blog

Practical insights, emerging risks, and clear guidance for building stronger cyber resilience.

Compliance 9 Min Read

The 2025 OWASP Top 10: What Changed

New categories, retired risks, and why supply chain and error handling now share the spotlight with classic web app flaws.

Recent Briefings

Compliance

The 2025 OWASP Top 10: What Changed

New categories, retired risks, and why supply chain and error handling now share the spotlight with classic web app flaws.

January 6, 2026 9 min read
Security Engineering

Vulnerability Scans and Server Headers

Why response headers show up in reports, when they matter, and how to trim noisy findings on platforms like Windows IIS.

December 10, 2025 7 min read
Security Engineering

Vulnerability Scans and TLS

SSL and TLS version and cipher issues are common in scan output—here is when they are a real risk versus report noise.

December 1, 2025 8 min read
Security Engineering

Active Directory on Steroids

A Monash University-inspired model that builds on Microsoft's enterprise access model for granular AD controls.

November 3, 2025 11 min read
Compliance

ASD Cyber Threat Report 2025 Recap

Cost of cybercrime, identity and BEC as entry points, and what the numbers suggest by business size.

October 26, 2025 6 min read
Community Impact

Pro Bono Cyber Security

How we support charities and not-for-profits serving underprivileged communities, inspired by partners like Project Black.

September 14, 2025 5 min read
Compliance

Are the ASD's Top Four Still on Top?

From 2015 ACSC stats to today: what the Top Four were designed to stop—and how they fit alongside the Essential Eight.

September 4, 2025 8 min read
Compliance

Revisiting the Commonwealth's Cyber Posture

Coverage of cyber security goals across Australian Government entities ahead of the next Commonwealth posture report.

September 1, 2025 10 min read
Penetration Testing

Access Control and Why It's Broken

Why access control stays at the top of the OWASP list and what goes wrong when apps blur roles, objects, and privilege boundaries.

August 24, 2025 9 min read
Security Engineering

Microsoft 365 Essentials for Admin Accounts

Treat admin identities as crown jewels: hardening, segmentation, and why losing one account can make headlines.

August 17, 2025 10 min read
Security Engineering

Microsoft 365 Business Licenses Explained

Basic, Standard, and Premium compared—what you get, security differences, and how to avoid overpaying for the wrong tier.

August 11, 2025 8 min read

Talk to us about
your next assessment

Whether you are scoping a test, preparing for an audit, or building a roadmap, we keep the conversation clear, proportionate, and focused on what your teams and stakeholders need.