Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Access our industry-leading resources to improve your cyber resilience: case studies, compliance guides, white papers plus educational tools and videos.
23 Results for your search
Huntsman Security solutions help achieve DISP accreditation by measuring your organisation’s alignment to the Top 4, to meet PSPF requirements.Access resource now
How Huntsman Security’s technology solution provides excellent support for the Australian Energy Sector Cyber Security Framework.Access resource now
The internal security audit tool, the Essential 8 Auditor systematically collects data and gathers evidence with a single click.Access resource now
Huntsman Security’s solution provides excellent coverage of CMMC requirements, to support audit requirements and improvement of cyber hygiene.Access resource now
Explore how to simplify fulfilling your regulatory commitments with Huntsman Security’s RegTech solutions. Discover your organisation’s cyber resilience.Access resource now
Discover how to achieve compliance to APRA Prudential Standard CPS 234 Information Security, 1 July 2019 using Huntsman Security’s RegTech.Access resource now
Huntsman Security’s ISO27001 compliance guide shows how its Enterprise SIEM monitors and reports on ISO 27001 controls, adding a centralised view to strengthen and develop your security posture.Access resource now
Measure and monitor your organisation’s ACSC Essential Eight compliance – a cyber security framework proven to eliminate 85% of cyber attacks. Learn more.Access resource now
Cyber risk measurement requires reliable performance metrics. Huntsman Security’s Essential 8 products systematically measure an organisation’s exposure.Access resource now
If your business is looking to build a SOC, or develop an existing one, Huntsman Security’s Enterprise SIEM will establish a core for your operation.Access resource now
Measurement of cyber security posture requires better tools, automated tools. Measure the effectiveness of your cyber security controls, automatically.Access resource now
The UK market has its own regulators, security standards and challenges. And while rulings from SEC in the US or the Australian Prudential Regulation Authority (APRA) in Australia don’t apply to UK companies, for the most part, the observations are undoubtedly relevant and the resulting advice instructive. It would be wrong to think UK financial […]Read article
<<< Part 2a: Australia’s Essential Eight: Beyond Endpoint Control <<< Part 2b: Activating UK NCSC & US NIST Guidelines: Beyond Endpoint Control Part 4: Systematic Measurement of Cyber Controls >>> As much as we invest into cyber security controls, external threats are inevitable. In a recent Notifiable Data Breaches Report from the Office of the […]Read article
Keen campers, scouts and even the Swiss Army know – that a good penknife is indispensable. This simple device has mitigated many a disaster at one point in time or another. Whether it’s to cut through a bit of string, tighten a screw or simply to solve the problem of no bottle opener in the […]Read article
Supply chain risk is an area of cyber security that demands the ongoing attention of every enterprise; because it can make the difference between being resilient or not. It’s no surprise that insurers warn that the vulnerability of supply chains is potentially a systemic risk that can quickly propagate across supply chain dominated industries. Organisations […]Read article
It took a “tripartite cyber assessment” by the Australian Prudential Regulation Authority (APRA) to identify that a sample of financial organisations had inadequate cyber security: poor security control management, a lack of business recovery planning and inadequate 3rd party risk assessment. Why were there gaps? Where is the failure? Clearly the common practice of unsubstantiated […]Read article
The discussion over data-driven vs qualitative cyber security assessment has been going for some time. Nowadays, it is at the top of the priority list for many security and senior executive teams. Managing cyber security has always been a noble ambition but without reliable measurement, the lack of actionable information makes evidence-based management decisions almost […]Read article
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.