Lessons From Teaching Cybersecurity: Week 9

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a ...

What is Certificate Lifecycle Management?

Using X.509 digital certificates for authentication is an immediate and significant upgrade to credential (password) authentication, but it requires proper support infrastructure. Certificate Lifecycle Management systems (CLM/CLMS), also called Certificate Management Systems ...

The Benefits of Remote Work Beyond Avoiding the Coronavirus (COVID-19)

Public health officials are advising people to working remotely, if they can, as one way to avoid contracting Coronavirus and #flattenthecurve. We hope those that can work remotely, do. Yet, for many, ...

Developing an Effective Change Management Program

Detection of change is easy… There, I said it. Anyone can do it. One thousand monkeys with keyboards can pound out scripts to detect change. What is not so easy, what the ...
Cyber risk management: safeguarding your organisation

Cyber risk management: safeguarding your organisation

What is cyber risk management? Cyber risk is the identification, analysis and evaluation of cyber risks. It understands and analyses the IT infrastructure, identifies the potential vulnerabilities within different systems, then prioritises ...
Cyber Security Roundup for January 2019

Cyber Security Roundup for January 2019

The first month of 2019 was a relatively slow month for cyber security in comparison with the steady stream of cyber attacks and breaches throughout 2018. On Saturday 26th January, car services ...
Information Security no longer the Department of “NO”

Information Security no longer the Department of “NO”

| | CISO, Infosec, management
The information security function within business has gained the rather unfortunate reputation for being the department of “no”, often viewed as a blocker to IT innovation and business transformation. A department seen ...
Building Cyber Resilience in Australia and Beyond - The Hon Christopher Pyne MP

Building Cyber Resilience in Australia and Beyond

| | management
Author: The Hon Christopher Pyne MP **Dtex is excited to feature this guest blog post from Australia’s Minister for Defence, the Hon Christopher Pyne MP. If there’s one thing we know to ...
Ben-matrix.png

The Quest for Optimal Security

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a ...

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way? ...