Four Exciting Takeaways from Cisco Live 2023
2023 is off to an exciting start for JDS, as Australia’s leading Cisco Full Stack Observability partner. There were a …
Atlassian Cloud Migration: The Clock Is Ticking
End of Server Sales and Support In late 2020, Atlassian announced their end-of-life roadmap for Server edition sales and support …
Part One: ServiceNow Hyperautomation – Process Optimisation
Improvement Initiatives As businesses grow, IT processes become increasingly complex and difficult to manage. This is where Process Optimisation comes …
Introduction to ServiceNow Hyperautomation
Imagine this… You’re at work, and suddenly an application you’re using stops working. You’re in a rush and can’t afford …
The Importance of Pen Testing Your Cloud Environment
As the uptake of cloud services increases, cybercriminals are more interested than ever in exploiting vulnerabilities to attack cloud services …
What is the difference between a Vulnerability Scan and a Penetration Test?
Vulnerability Scanning and Penetration Testing are terms that are often interchanged and even confused for the same activity, and while …
Fortifying Defense with Offense
Detecting and defending against incoming attacks is a key component of a strong blue team, and SIEM capabilities play an …
Top Five Actions to Improve Your Cyber Security Posture
The current state of Australian security breaches has thrown organisations into chaos and disarray. Australia is currently 5th in the …
Manual Security Testing vs Automated Scanning?
The art of penetration testing has evolved over the years. What began with testing arrows on armour, has now become …
Have You Considered “Swinging” With Your Pen Testing Provider?
Have you been in a long-term relationship with your existing penetration testing vendor? Starting to feel like it’s time to …
What It Means To Be CREST (Intl) Accredited
Anyone with a computer and an Internet connection can set themselves up as a penetration testing or cyber incident response …
Five Reasons Why Your Organisation Should Be Penetration Testing
Modern businesses require an advanced approach to security and due diligence. Having anti-virus software and a firewall is no longer …