Latest Insights

Addressing challenges associated with cloud adoption

In this article, Tesserent explores the challenges that arise when businesses step into the world of cloud adoption and provides insight for organisations to assist in navigating through the complexities of their cloud enablement strategy.

The Evolution of Cybersecurity: NIST Releases Draft of Cybersecurity Framework 2.0

NIST unveils Cybersecurity Framework 2.0, a significant update since 2014, reflecting evolving needs, fostering collaboration, and enhancing cybersecurity excellence

Top 5 recommendations for the Victorian State Parliament to improve response against cyberattacks

In a recent report tabled in the Victorian state parliament, the Victorian Auditor-General’s Office has highlighted a concerning rise in cyberattacks targeting government agencies. The report reveals that 90% of Victorian government agencies fell victim to cyberattacks last year, putting critical services at risk of disruption. The implications of these attacks extend beyond data breaches, potentially leading to disrupted communication networks, compromised personal information, and the shutdown of vital facilities including water, health, and emergency services.

Unveiling the challenges: APRA Stocktake Exposes 6 Major Gaps to meet CPS234 Compliance

Part of APRA's 2020-2024 Cyber Security Strategy included a CPS234 tripartite cyber assessment program. This assessment program is the largest study of its kind and involves a compliance assessment of more than 300 banks, insurers, and superannuation trustees by the end of 2023.

The CPS234 tripartite assessment, following a successful pilot completed in mid-2021 has continued through 2022-23. A summary of the first round of findings from the initial assessments have been released and they show consistent gaps throughout the industry.

Why security awareness alone is not enough

Information security awareness is crucial for organisations to protect their sensitive information and prevent security incidents and data breaches. It’s not a surprise that it is a key control included in every security standard and best practice framework.

Filter Insights: