Under attack? Call 1300 112 313
Insights and Guides

Practical cybersecurity guides for leaders, IT teams and security owners.

Use these guides to prepare for incidents, improve controls, understand frameworks and build stronger security operations.

Incident Response

Guide · 8 min

What to do in the first 24 hours after a breach

A practical first-response guide for containment, evidence preservation and decision-making.

Read guide
Guide · 12 min

How to write an incident response plan that works

Build an IR plan that helps during real incidents, not just audits. Decision authority, evidence checklists and testing.

Read guide
Checklist · 7 min

Ransomware containment checklist

Steps to stabilise the environment without destroying evidence or blocking investigation.

Read checklist
Guide · 6 min

Business email compromise response guide

Mailbox triage, forwarding rule checks, OAuth review, password resets and stakeholder communications.

Read guide

GRC and Assurance

Guide · 9 min

Essential Eight, ISO 27001 and NIST CSF: how they fit together

Understand how common frameworks support baseline hardening, management systems and risk communication.

Read guide
Guide · 10 min

How to report cybersecurity to a board

Structure, metrics and language that help board members make risk decisions instead of glazing over.

Read guide
Guide · 7 min

Preparing for customer security questionnaires

How to build reusable evidence instead of answering every assurance request from scratch.

Read guide
Guide · 6 min

What auditors usually expect from control evidence

How to move from policy statements to operating evidence, owners, timestamps and repeatable review cycles.

Read guide

Cloud and Identity

Guide · 8 min

Cloud misconfiguration: controls that usually matter first

IAM, logging, public exposure, backups, secrets and network controls to prioritise early.

Read guide
Checklist · 6 min

Privileged access review checklist

A practical checklist for reviewing administrator access, exceptions and approval pathways.

Read checklist
Guide · 7 min

Conditional access baseline

Common identity policies that reduce account compromise risk while remaining practical for users.

Read guide

Security Operations

Guide · 8 min

Why EDR is not enough without an operating model

EDR tools need ownership, triage, tuning, escalation and response authority to deliver value.

Read guide
Template · 6 min

Basic SOC operating model

A lightweight model for alert intake, triage, escalation, evidence capture and reporting.

Read template
Guide · 5 min

Security metrics that actually matter

Move beyond alert counts and track whether response, coverage and control maturity are improving.

Read guide