Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Access our industry-leading resources to improve your cyber resilience: case studies, compliance guides, white papers plus educational tools and videos.
8 Results for your search
Looking forward to the next year in cyber security: insight into how 2023 will impact your organisation’s risk exposure.Access resource now
Explore why Huntsman SIEM solution was chosen to provide real-time security monitoring for a modern cloud-native global retailer.Access resource now
Looking forward to the next year in cyber security: insight into how 2022 will impact your organisation’s risk exposure.Access resource now
How an organisation that provides IT services to 9 organisations gained a centralised view of security control effectiveness. This case study demonstrates how the Essential 8 Scorecard was used to continuously monitor an organisation’s IT environment to assess the effectiveness of their security controls and communicate the performance metrics to all stakeholders; to provide the operational team with a list of of uncontrolled risks and the senior executives an objective measure of cyber risk.Access resource now
How two organisations developed and grew their managed security services. This case study details how Next Gen SIEM MSSP was used to develop and grow the managed security services offering of two very different managed services providers. It explains their objectives, challenges and how they achieved success.Access resource now
Explore why this this credit union chose Huntsman technology to meet its compliance obligations to PCI-DSS, ISO 27001 and APRA CPG234.Access resource now
Explore why this investment management services company to some of Australia’s leading life insurers, superannuation providers and funds managers chose Huntsman SIEM.Access resource now
<<< Part 2a: Australia’s Essential Eight: Beyond Endpoint Control <<< Part 2b: Activating UK NCSC & US NIST Guidelines: Beyond Endpoint Control Part 4: Systematic Measurement of Cyber Controls >>> As much as we invest into cyber security controls, external threats are inevitable. In a recent Notifiable Data Breaches Report from the Office of the […]Read article
Keen campers, scouts and even the Swiss Army know – that a good penknife is indispensable. This simple device has mitigated many a disaster at one point in time or another. Whether it’s to cut through a bit of string, tighten a screw or simply to solve the problem of no bottle opener in the […]Read article
Supply chain risk is an area of cyber security that demands the ongoing attention of every enterprise; because it can make the difference between being resilient or not. It’s no surprise that insurers warn that the vulnerability of supply chains is potentially a systemic risk that can quickly propagate across supply chain dominated industries. Organisations […]Read article
It took a “tripartite cyber assessment” by the Australian Prudential Regulation Authority (APRA) to identify that a sample of financial organisations had inadequate cyber security: poor security control management, a lack of business recovery planning and inadequate 3rd party risk assessment. Why were there gaps? Where is the failure? Clearly the common practice of unsubstantiated […]Read article
The discussion over data-driven vs qualitative cyber security assessment has been going for some time. Nowadays, it is at the top of the priority list for many security and senior executive teams. Managing cyber security has always been a noble ambition but without reliable measurement, the lack of actionable information makes evidence-based management decisions almost […]Read article
Attack Surface Management (ASM) characterises a business’s security risks as the monitoring and risk mitigation of a constantly changing and vulnerable “risk-surface”. Importantly, this attack surface extends to both internal and external assets and services. Some ASM solutions deliver clear visibility across both Internet facing and internal assets. Others do not. Instead, they assess external […]Read article
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.