Financial inclusion, digital ID and cyberwar

In this final assessment I looked the current and emerging cyber security vulnerabilities of financial inclusion. In answering this question I looked at what financial inclusion and digital identity are, and how are they correlated. I then described three significant cyber threats posed by financial inclusion projects and how they can be controlled by applying the ACSC […]
Red teaming

An overview of Red Teaming and the role it plays in cybersecurity. Who should use it, how does it differ from penetration testing and is it better than Purple Teaming? Red teaming, also known as Cyber Red Team is recognised as one of the best ways to assess the robustness and resilience (define these) of […]
Cybercrime vs other crime

What distinguishes cybercrime from other types of crime, and why is this important to the cyber security profession? When considering what distinguishes cybercrime from other types of crime, we could use the AFP definition and simply conclude that it is when ICT is either the target of, or plays a major role in perpetrating a […]