Sign in

Logan Daley. Chief Sentence Officer. Cybersecurity Writer & Presenter. Canadian / Australian. #humanitynotmachinery. Promoter of Empathy, Respect & Kindness.
Influencer or manipulator? It can be hard to tell sometimes. At the core, we must understand intentions and outcomes and who gains (or loses) more.

In Australia, we have eight apps for checking in, but only one centarlised database of vaccination information. Wouldn’t it make sense to align our efforts?
The Australian Signals Directorate (ASD) Australian Cyber Security Centre (ACSC) created the Essential Eight Strategies to Mitigate Cyber Security Incidents, and it contains a wealth of information any business can benefit from.

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents Maturity Model to keep pace with the current threat landscape. The new model is thorough in addressing omissions from previous versions. …

Keeping you applications up to date is a great way to secure your investments

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cybersecurity Incidents Maturity Model to keep pace with the current threat landscape. The new model is more cohesive, thorough and addresses many key omissions from previous versions. …

The Australian Cyber Security Centre has updated its Essential Eight Maturity Model

It’s hard to argue against my passion for cybersecurity and by extension, how much respect and appreciation I have for the Australian Cyber Security Centre (ACSC). I have long sought their advice and counsel on matters ranging from the mundane to the critical and all points in between. …

Image Source: Pexels

System monitoring is something we all do, but something few of us do well. …

Photo by Christine Roy on Unsplash

These three terms confuse businesses and individuals alike, and often their very mention is akin to being challenged to a duel between those seeking a service and those wishing to fill that requirement. Unfortunately, unlike olden times, a winner rarely emerges from the inevitable verbal sparring that ensues. …

Photo by bert brrr on Unsplash

No matter how much money and time you spend on trying to avoid and prevent a cybersecurity incident, it is inevitable that one will occur. Our mindset must be “when” and not “if” because it really is just a matter of time before something happens, whether it is our fault…

Digitally Vicarious

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store