Atlassian Cloud Migration: The Clock Is Ticking

End of Server Sales and Support In late 2020, Atlassian announced their end-of-life roadmap for Server edition sales and support in a push towards migrating to Atlassian Cloud (see below). Three years on, we find ourselves hitting the third milestone of this plan, and no longer have the ability to purchase new apps for Atlassian Server. The final end-of-support date …

Part One: ServiceNow Hyperautomation – Process Optimisation

Improvement Initiatives As businesses grow, IT processes become increasingly complex and difficult to manage. This is where Process Optimisation comes in, providing a way to evaluate and enhance the performance of your IT processes using data from your systems. In other words, it’s a method of making sure that your IT processes are running as smoothly and efficiently as possible …

Introduction to ServiceNow Hyperautomation

Imagine this… You’re at work, and suddenly an application you’re using stops working. You’re in a rush and can’t afford to spend hours on the phone with technical support. But what if there was a way to get your problem solved quickly and efficiently, without ever having to speak to a human being? The ServiceNow Virtual Agent is an AI-driven …

The Importance of Pen Testing Your Cloud Environment

As the uptake of cloud services increases, cybercriminals are more interested than ever in exploiting vulnerabilities to attack cloud services and it’s customers. If your organisation is using cloud services, it’s important to recognise the shared responsibility model where the Cloud Service Provider (CSP) and the client share certain responsibilities, including cybersecurity. The CSP, such as AWS, Google Cloud, or …

/ Blog, cloud, JDSSecurity, pentesting, Secure, Test

What is the difference between a Vulnerability Scan and a Penetration Test?

Vulnerability Scanning and Penetration Testing are terms that are often interchanged and even confused for the same activity, and while they are similar, they are not the same. So what are the key differences, and how and when should they be carried out? What is a Vulnerability Scan? A Vulnerability Scan is performed within your network, systems, services, or applications …

Fortifying Defense with Offense

Detecting and defending against incoming attacks is a key component of a strong blue team, and SIEM capabilities play an important part of the technology stack to achieve this. But, with rapidly evolving cyber threats, it is important to adapt and innovate to stay ahead. Joint activities between red and blue teams, known as purple teaming, allows for easy knowledge …

Top Five Actions to Improve Your Cyber Security Posture

The current state of Australian security breaches has thrown organisations into chaos and disarray. Australia is currently 5th in the World for cybercrime density, and 11th in the World for the average cost of a data breach ($4.5m). However, most of these breaches could have been avoided had basic cyber security hygiene been implemented. If implemented correctly, the five items …

/ Blog, JDSSecurity, Secure, Test

Manual Security Testing vs Automated Scanning?

The art of penetration testing has evolved over the years. What began with testing arrows on armour, has now become testing tools and techniques on systems and applications. Without a doubt, we are still mostly using manually driven techniques, however this can be slow, cumbersome, and subject to the human element which can result in faults and missed opportunities.

Over the …

/ Blog, JDSSecurity, Secure, Tech Tips, Test

Have You Considered “Swinging” With Your Pen Testing Provider?

Have you been in a long-term relationship with your existing penetration testing vendor? Starting to feel like it’s time to ‘spice things up’ a bit? It’s easy to settle into a partnership with a vendor that you’ve got to know, they’ve got to know you along with the more intimate details of your business, and all of the ‘skeletons in …

/ Blog, JDSSecurity, Secure, Test