Analysis, commentary, and practical guidance from SALTT Tech's practitioners.
Claude Mythos Vendor Breach: Implications for Enterprise Exposure Management A review of the reported Project Glasswing vendor breach and what it means for organisations outside the 40-partner consort...
Read ArticleTwo of the largest AI developers — OpenAI and Anthropic — both expanded their security-focused AI capabilities this week. For Australian sec...
Traditional penetration testing has a coverage problem. A typical web application assessment covers somewhere between 20 and 40 per cent of ...
Penetration testing has not changed much in its fundamentals over the past two decades. A skilled consultant, a defined scope, a time-boxed ...
Most organisations that commission a penetration test understand, broadly, what they are asking for: a skilled consultant to attempt to brea...
The Essential 8 has been part of the Australian cybersecurity landscape for nearly a decade. In that time it has evolved from a recommended ...
Russian military intelligence unit APT28 has been systematically compromising consumer and small-business routers to conduct cyber espionage...
Microsoft researchers have reported a technique, informally dubbed “BitUnlocker”, that enables bypass of BitLocker full volume encryption un...
Deepfake technology, though impressively innovative, poses serious threats to both individuals and businesses on a global scale. These threa...
KnowBe4 has launched an interactive and exciting way to learn cyber security in a relaxed environment, in the form of a game called 'Hack-A-...