
What is the difference between a Vulnerability Scan and a Penetration Test?
Vulnerability Scanning and Penetration Testing are terms that are often interchanged and even confused for the same activity, and while …
Read More
Read More

Fortifying Defense with Offense
Detecting and defending against incoming attacks is a key component of a strong blue team, and SIEM capabilities play an …
Read More
Read More

Top Five Actions to Improve Your Cyber Security Posture
The current state of Australian security breaches has thrown organisations into chaos and disarray. Australia is currently 5th in the …
Read More
Read More

Manual Security Testing vs Automated Scanning?
The art of penetration testing has evolved over the years. What began with testing arrows on armour, has now become …
Read More
Read More

Have You Considered “Swinging” With Your Pen Testing Provider?
Have you been in a long-term relationship with your existing penetration testing vendor? Starting to feel like it’s time to …
Read More
Read More

What It Means To Be CREST (Intl) Accredited
Anyone with a computer and an Internet connection can set themselves up as a penetration testing or cyber incident response …
Read More
Read More

Five Reasons Why Your Organisation Should Be Penetration Testing
Modern businesses require an advanced approach to security and due diligence. Having anti-virus software and a firewall is no longer …
Read More
Read More

Mastering Modal Dialog Boxes
Modal Dialog boxes are a great way to enhance the user experience and provide more detailed feedback to users than …
Read More
Read More

Understanding your Customer Journeys in Salesforce with AppDynamics
The Problem
JDS Australia works with numerous customers who utilise the force.com platform as the primary interface for their end users …
Read More

5 Ways uberAgent Measures Your Employee Digital Experience
Measuring employee digital experience is a great way to assess how well your systems are performing. With the move to …
Read More
Read More

Implementing Salesforce monitoring in Splunk
The problem A JDS customer embarked on a project to implement Salesforce to provide their users a single user interface …
Read More
Read More

Virtual Agent: Understanding The Limitations Of LITE
Understanding the difference between Virtual Agent LITE and the full Virtual Agent offering is a must when planning your organisation’s …
Read More
Read More