About
About Spartans
Certificates
Case Study
Our Team
Careers
Our Services
Strategy and Risk
Security Assessments
Compliance & Privacy
Offensive Security
Cloud Security
Incident Response
Leading Offerings
vCISO
NIST Framework
Penetration Testing
Zero Trust Assessment
ASD Essential 8
Microsoft Security
Microsoft Purview
Resources
Blog
Report
Reports
Case Studies
Verticals
Contact us
Get a Quote
Penetration Testing
Home
All Blog
Penetration Testing
AI Security
Microsoft Purview
Cloud Security
Breach & Attack Simulation
Penetration Testing
DMARC Compliance
ISO27001/ISMS
PCI-DSS
ASD Essential Eight
Incident Response
Zero Trust Security
NIST Cyber Security Framework
Security Budget and Roadmap
Executive and Board Level Awareness
Virtual CISO
Mergers and Aquisitions
Strategy and Risk
Cybersecurity Trends
Flipper Zero: Choosing the Best Firmware for Pentesting
February 20, 2025
March 6, 2025
A Transparent Authentication Experience: The rise of Keystroke Analysis
December 16, 2024
February 15, 2025
Cyber Deception And Active Defence: The Future of Australian Cyber Security
December 13, 2024
February 17, 2025
Quantum Computing and Encryption: Reality vs. Hype
December 11, 2024
February 17, 2025
CTI4U: A Practical Introduction to Starting a Cyber Threat Intelligence Program - Part 1
December 3, 2024
February 17, 2025
The Internet is forever: Assessing and managing your digital footprint
November 29, 2024
February 17, 2025
MITRE ATT&CK v14: Real Talk on Detection, ICS, and Expanded Scope
November 8, 2024
February 15, 2025
Exposure Management: Shifting Gears for Cyber’s Next Challenge
November 7, 2024
February 15, 2025
Challenging the Numbers: A Journey to Validate Vulnerable Device Figures
November 4, 2024
February 15, 2025
Cyber Security Threats to the Australian Education Sector
October 23, 2024
March 8, 2025
Are Your Third-Party SOC Providers Actually Doing Their Job?
October 22, 2024
February 15, 2025
Windows Persistence Through Scheduled Tasks: A Red Team Perspective
October 4, 2024
February 15, 2025
How to Bypass UAC in Windows Using netplwiz and the Mitigations to Prevent It
October 3, 2024
February 15, 2025
How to Know if your Security Operations Centre is Protecting and Monitoring Effectively
March 27, 2024
February 15, 2025
Understanding Privilege Escalation: A Critical Threat in Cybersecurity
March 25, 2024
February 15, 2025
Three common vulnerabilities in web applications may be solved with one simple solution
March 18, 2024
February 15, 2025
Attack Surface Reduction – A Microsoft Feature You Probably Already Have but Didn’t Know It!
March 6, 2024
February 15, 2025
Safeguarding Infrastructure: Understanding and Mitigating the Risks of Vulnerable Microsoft Active Directory Certificate Services (AD CS)
March 27, 2024
February 15, 2025
2023: A Grim Year for Ransomware - Statistics, Stories, and Strategies for 2024
January 25, 2024
February 15, 2025