Developing an Effective Change Management Program

Detection of change is easy… There, I said it. Anyone can do it. One thousand monkeys with keyboards can pound out scripts to detect change. What is not so easy, what the ...
Metrics

When Security Metrics Miss The Point

After countless years of presenting to boards, executives, and colleagues, I’ve found that I’ve developed almost a split-personality when I’m asked about what metrics to track. The post When Security Metrics Miss ...
Cyber risk management: safeguarding your organisation

Cyber risk management: safeguarding your organisation

What is cyber risk management? Cyber risk is the identification, analysis and evaluation of cyber risks. It understands and analyses the IT infrastructure, identifies the potential vulnerabilities within different systems, then prioritises ...
Cyber Security Roundup for January 2019

Cyber Security Roundup for January 2019

The first month of 2019 was a relatively slow month for cyber security in comparison with the steady stream of cyber attacks and breaches throughout 2018. On Saturday 26th January, car services ...
Information Security no longer the Department of “NO”

Information Security no longer the Department of “NO”

| | CISO, Infosec, management
The information security function within business has gained the rather unfortunate reputation for being the department of “no”, often viewed as a blocker to IT innovation and business transformation. A department seen ...
Free NIST CSF Maturity Tool

Free NIST CSF Maturity Tool

In my previous post, ‘My Three Wishes for 2019’, I had wished that we all find a way to give back to the industry, even a little bit. In an effort to ...
“Choosing

How to Buy a Security Awareness Training Program

Are you in search of a security awareness training program to help educate your employees on cyber security best practices? There are lots of options and you may even be deciding on ...
Building Cyber Resilience in Australia and Beyond - The Hon Christopher Pyne MP

Building Cyber Resilience in Australia and Beyond

| | management
Author: The Hon Christopher Pyne MP **Dtex is excited to feature this guest blog post from Australia’s Minister for Defence, the Hon Christopher Pyne MP. If there’s one thing we know to ...
Ben-matrix.png

The Quest for Optimal Security

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a ...

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way? ...