Recent Australia Cyber Attacks | RedShield’s Unique Solution

Following recent warnings from the Australian Prime Minister about sophisticated cyber attacks being targeted at Australia by 'state actors', we wanted to share information on RedShield's unique capabilities as a solution to the current threats. The Australian Cyber...

RedShield appoints Senior Verizon Cyber Security VP as Chief Revenue Officer in U.S. Push

RedShield, specialists in web application shielding, has announced the appointment of global cyber security leader, James Carrigan Jr. as Chief Revenue Officer (CRO), responsible for sales globally.

Your AI WAF is leaving you 100% vulnerable…

Your AI WAF is leaving you 100% vulnerable...I love technology. I’m the biggest sucker for buying new gadgets with flashing lights. So, as you can imagine (and despite the obvious privacy concerns) I absolutely love my AI driven (well, somewhat AI driven) Google Home...

Cryptojacking – Browser cryptocurrency mining

Cryptojacking – Browser cryptocurrency miningI’m going to start by saying I really should have one of those T-shirts; “Yes I work in IT, but NO I won’t fix your computer”. I’m sure you can all relate to being at a family function until someone can’t help but ask “I’ve...

Into the cyber-way fray: RedShield

Into the cyber-way fray: RedShieldSAAS with a twist helps RedShield stand out in a tough global market niche. Concentrate talked to Founder and CEO Andy Prow of RedShield, the company that won both the best product and best service categories at the 2017 New Zealand...

WannaPatch?

WannaPatch?WannaCry, the biggest cybersecurity news story so far in 2017, raised a number of interesting questions in respect of industry ethics and security best practices specifically relating to: Whether governments should attempt to stockpile vulnerabilities for...

Why you need Human Penetration Testers

Why you need Human Penetration TestersI’ve spent 15 years performing penetration testing for governments and corporates around the world. It’s an essential tool for determining your exposure, allowing you to get as close as possible to simulating a real-life attack,...

Deflecting a Digital Transformation Disaster

Deflecting a Digital Transformation DisasterChances are you’ve heard about this Digital Dog that’s been unceremoniously digging in all of our yards? Annoyingly whilst I know what “Digital” is, whenever I hear the word “digital” my brain seems to instantly picture a...

Redefining The AWS Shared Responsibility Model

Redefining The AWS Shared Responsibility ModelThe Preconceived Cloud Security Problem Businesses are overwhelming realizing the benefits of adopting cloud infrastructure strategies. Software, Platform and Infrastructure “As A Service” options are supporting wholesale...

Our blog 

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.