Security Management

IBRS State of Identity Whitepaper

This paper sheds light on critical aspects of identity and access management such as justifying investments, controlling federated identities, and addressing certification fatigue.

Read More »

Implementing the ASD Essential Eight Part 2: A Fresh Viewpoint

As detailed in part one of this pair of notes, the Australian Signals Directorate’s Essential Eight (E8) are detailed technical recommendations for securing an information infrastructure. Implementing them has been touted as being effective against over 85 % of potential attacks. It is hard to ignore that benefit to an organisation’s security stance.

Read More »

Search