The Importance of Pen Testing Your Cloud Environment
As the uptake of cloud services increases, cybercriminals are more interested than ever in exploiting vulnerabilities to attack cloud services …
What is the difference between a Vulnerability Scan and a Penetration Test?
Vulnerability Scanning and Penetration Testing are terms that are often interchanged and even confused for the same activity, and while …
Fortifying Defense with Offense
Detecting and defending against incoming attacks is a key component of a strong blue team, and SIEM capabilities play an …
Top Five Actions to Improve Your Cyber Security Posture
The current state of Australian security breaches has thrown organisations into chaos and disarray. Australia is currently 5th in the …
Manual Security Testing vs Automated Scanning?
The art of penetration testing has evolved over the years. What began with testing arrows on armour, has now become …
Have You Considered “Swinging” With Your Pen Testing Provider?
Have you been in a long-term relationship with your existing penetration testing vendor? Starting to feel like it’s time to …
What It Means To Be CREST (Intl) Accredited
Anyone with a computer and an Internet connection can set themselves up as a penetration testing or cyber incident response …
Five Reasons Why Your Organisation Should Be Penetration Testing
Modern businesses require an advanced approach to security and due diligence. Having anti-virus software and a firewall is no longer …
Mastering Modal Dialog Boxes
Modal Dialog boxes are a great way to enhance the user experience and provide more detailed feedback to users than …
Understanding your Customer Journeys in Salesforce with AppDynamics
The Problem
JDS Australia works with numerous customers who utilise the force.com platform as the primary interface for their end users …
5 Ways uberAgent Measures Your Employee Digital Experience
Measuring employee digital experience is a great way to assess how well your systems are performing. With the move to …
Implementing Salesforce monitoring in Splunk
The problem A JDS customer embarked on a project to implement Salesforce to provide their users a single user interface …