<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Defence Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/defence/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/defence/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Wed, 06 May 2026 04:56:34 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Defence Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/defence/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beyond the Malware: How Restricting Java Arguments Can Protect Your Linux Servers</title>
		<link>https://www.vertexcybersecurity.com.au/beyond-the-malware-how-restricting-java-arguments-can-protect-your-linux-servers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=beyond-the-malware-how-restricting-java-arguments-can-protect-your-linux-servers</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 06 May 2026 03:37:10 +0000</pubDate>
				<category><![CDATA[Defence]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Java Security]]></category>
		<category><![CDATA[Linux Server Protection]]></category>
		<category><![CDATA[Malware Defence]]></category>
		<category><![CDATA[Whitelisting]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10677</guid>

					<description><![CDATA[Learn how to protect your Linux servers from "living off the land" attacks by restricting Java command arguments using whitelisting and AppArmor.]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing for Small Businesses</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-for-small-businesses/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-for-small-businesses</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 14 Mar 2025 03:42:40 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity Tips]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Small Business Security]]></category>
		<category><![CDATA[Vulnerability Assessment]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9186</guid>

					<description><![CDATA[Introduction In today’s digital world, small businesses face growing cyber security threats. Many owners assume that hackers only target large corporations. However, this misconception can leave them vulnerable. One effective way to protect your business is through penetration testing. This process identifies security gaps before malicious actors can exploit them. In this blog, we’ll explore [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Staying Safe Online: Lessons from the Case of the &#8220;Evil Twin&#8221;</title>
		<link>https://www.vertexcybersecurity.com.au/staying-safe-online-lessons-from-the-case-of-the-evil-twin/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=staying-safe-online-lessons-from-the-case-of-the-evil-twin</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 24 Jul 2024 06:36:43 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[MFA (multi-factor authentication)]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Cyber Crime Prevention]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[Digital Privacy]]></category>
		<category><![CDATA[Evil Twin Networks]]></category>
		<category><![CDATA[Online Safety]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Public Wi-Fi]]></category>
		<category><![CDATA[Two-Factor Authentication]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8314</guid>

					<description><![CDATA[The recent apprehension of a man accused of creating &#8220;evil twin&#8221; Wi-Fi networks to steal personal information has highlighted the ongoing threat of cyber crimes. As we increasingly rely on digital connectivity, it&#8217;s crucial to adopt practices that enhance our online security. Here’s how you can keep yourself safe online, drawing lessons from the case [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Insider Threat Testing in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/insider-threat-testing-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=insider-threat-testing-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Tue, 28 May 2024 23:40:42 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8187</guid>

					<description><![CDATA[Introduction In the ever-evolving world of cyber security, organisations must remain vigilant against a myriad of threats. While much focus is given to external attacks, the risks posed by insiders should not be overlooked. Insider threat testing, a key component of penetration testing, is crucial for identifying and mitigating risks from within. This blog explores [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Malware Analysis in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/malware-analysis-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=malware-analysis-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 03 May 2024 01:53:10 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Threat Identification]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7912</guid>

					<description><![CDATA[Introduction In the dynamic world of cyber security, penetration testing remains a crucial strategy for protecting organisational assets. A pivotal component of this approach is malware analysis. This technique not only bolsters defence mechanisms but also deepens understanding of potential threats. In this blog, we&#8217;ll explore the significance of malware analysis within penetration testing, its [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Zero-Day Vulnerability Testing for Robust Security</title>
		<link>https://www.vertexcybersecurity.com.au/zero-day-vulnerability-testing-for-robust-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=zero-day-vulnerability-testing-for-robust-security</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 29 Apr 2024 03:03:55 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<category><![CDATA[Zero-Day Testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7872</guid>

					<description><![CDATA[Introduction: Zero-Day Vulnerability Testing—What Does It Mean? In the world of cyber security, staying ahead of threats is not just important; it&#8217;s essential. Zero-day vulnerability testing represents a critical component of a robust security strategy. This type of testing actively identifies and mitigates vulnerabilities in software and systems before the public knows about them and, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Phishing Testing Vendors: You Need Someone Secure</title>
		<link>https://www.vertexcybersecurity.com.au/insecure-phishing-testing-platforms-selecting-the-right-secure-vendor/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=insecure-phishing-testing-platforms-selecting-the-right-secure-vendor</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 26 Apr 2024 07:57:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[SOC2]]></category>
		<category><![CDATA[cybersecurity strategy]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[phishing testing]]></category>
		<category><![CDATA[vendor security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7854</guid>

					<description><![CDATA[Phishing testing vendors can introduce significant risks to your organisation if they are not secure and trustworthy. Phishing testing is an important component in cyber security strategies. Discover the risks of insecure phishing vendors and understand how ISO 27001 and SOC2 certifications safeguard your data security.By simulating phishing attacks, organisations can identify vulnerabilities in their [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Single-Vector Penetration Testing: A Simplified Approach</title>
		<link>https://www.vertexcybersecurity.com.au/single-vector-penetration-testing-a-simplified-approach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=single-vector-penetration-testing-a-simplified-approach</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 26 Apr 2024 02:34:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7851</guid>

					<description><![CDATA[Introduction: Unpacking Single-Vector Penetration Testing Single-vector penetration testing is a targeted approach to cyber security, where testers focus on one specific entry point or threat vector to evaluate a system&#8217;s security. This method is instrumental in identifying and fortifying potential vulnerabilities within that specific area. By concentrating on one vector, organisations can more efficiently allocate [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>External Penetration Testing in Cyber Security: The Essentials</title>
		<link>https://www.vertexcybersecurity.com.au/external-penetration-testing-in-cyber-security-the-essentials/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=external-penetration-testing-in-cyber-security-the-essentials</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 03:00:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[External Penetration Testing]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7841</guid>

					<description><![CDATA[Introduction In an era where cyber threats loom large, ensuring the security of digital infrastructures is paramount. External penetration testing, a critical component of a robust cyber security strategy, helps organisations identify and address vulnerabilities from an attacker&#8217;s perspective. This blog explores the vital aspects of external pen testing and why it&#8217;s essential for protecting [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Non-Targeted Penetration Testing: A Crucial Tool for Cyber Security</title>
		<link>https://www.vertexcybersecurity.com.au/non-targeted-penetration-testing-a-crucial-tool-for-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=non-targeted-penetration-testing-a-crucial-tool-for-cyber-security</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 17 Apr 2024 03:03:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7832</guid>

					<description><![CDATA[Introduction In the rapidly evolving realm of cyber security, safeguarding digital assets demands innovative and rigorous testing methods. Non-targeted penetration testing stands out as a proactive strategy, focusing on exploring an organisation&#8217;s network without a predefined target. This comprehensive approach helps uncover hidden vulnerabilities that targeted tests might overlook. What is Non-Targeted Penetration Testing? Non-targeted [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
