
Part One: ServiceNow Hyperautomation – Process Optimisation
Improvement Initiatives As businesses grow, IT processes become increasingly complex and difficult to manage. This is where Process Optimisation comes in, providing a way to evaluate and enhance the performance of your IT processes using data from your systems. In other words, it’s a method of making sure that your IT processes are running as smoothly and efficiently as possible …

Introduction to ServiceNow Hyperautomation
Imagine this… You’re at work, and suddenly an application you’re using stops working. You’re in a rush and can’t afford to spend hours on the phone with technical support. But what if there was a way to get your problem solved quickly and efficiently, without ever having to speak to a human being? The ServiceNow Virtual Agent is an AI-driven …

The Importance of Pen Testing Your Cloud Environment
As the uptake of cloud services increases, cybercriminals are more interested than ever in exploiting vulnerabilities to attack cloud services and it’s customers. If your organisation is using cloud services, it’s important to recognise the shared responsibility model where the Cloud Service Provider (CSP) and the client share certain responsibilities, including cybersecurity. The CSP, such as AWS, Google Cloud, or …

What is the difference between a Vulnerability Scan and a Penetration Test?
Vulnerability Scanning and Penetration Testing are terms that are often interchanged and even confused for the same activity, and while they are similar, they are not the same. So what are the key differences, and how and when should they be carried out? What is a Vulnerability Scan? A Vulnerability Scan is performed within your network, systems, services, or applications …

Fortifying Defense with Offense
Detecting and defending against incoming attacks is a key component of a strong blue team, and SIEM capabilities play an important part of the technology stack to achieve this. But, with rapidly evolving cyber threats, it is important to adapt and innovate to stay ahead. Joint activities between red and blue teams, known as purple teaming, allows for easy knowledge …

Top Five Actions to Improve Your Cyber Security Posture
The current state of Australian security breaches has thrown organisations into chaos and disarray. Australia is currently 5th in the World for cybercrime density, and 11th in the World for the average cost of a data breach ($4.5m). However, most of these breaches could have been avoided had basic cyber security hygiene been implemented. If implemented correctly, the five items …

Manual Security Testing vs Automated Scanning?
The art of penetration testing has evolved over the years. What began with testing arrows on armour, has now become testing tools and techniques on systems and applications. Without a doubt, we are still mostly using manually driven techniques, however this can be slow, cumbersome, and subject to the human element which can result in faults and missed opportunities.
Over the …

Have You Considered “Swinging” With Your Pen Testing Provider?
Have you been in a long-term relationship with your existing penetration testing vendor? Starting to feel like it’s time to ‘spice things up’ a bit? It’s easy to settle into a partnership with a vendor that you’ve got to know, they’ve got to know you along with the more intimate details of your business, and all of the ‘skeletons in …

JDS Australia Named 2022 Splunk APAC Services Partner of the Year
JDS Australia announced today it has received the 2022 APAC Services Partner of the Year for exceptional performance and commitment to Splunk’s Partnerverse. The APAC Services Partner of the Year award recognizes an APAC Splunk partner that is actively engaged in services implementations, in addition to having a strong commitment to training and certification of their organisation. “We’re thrilled to …