<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Training Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/training/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/training/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Fri, 22 Aug 2025 18:07:39 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Training Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/training/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Biggest Cyber Risk? The IT Person Who Claims &#8220;We&#8217;ve Got Security Covered&#8221;</title>
		<link>https://www.vertexcybersecurity.com.au/the-biggest-cyber-risk-the-it-person-who-claims-weve-got-security-covered/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-biggest-cyber-risk-the-it-person-who-claims-weve-got-security-covered</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 07 Aug 2025 04:17:09 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[biggest cyber risk]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[CTO]]></category>
		<category><![CDATA[internal IT staff]]></category>
		<category><![CDATA[IT Manager]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9525</guid>

					<description><![CDATA[In the complex and ever-evolving landscape of digital security, many business leaders rest on the assurance of their internal IT team. It is a common belief that the same individuals who manage your network and troubleshoot computer issues are also the stalwart guardians of your most sensitive data. However, this assumption could be the single [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>AI Is A Great Coding Tool, But It Is Still Vulnerable</title>
		<link>https://www.vertexcybersecurity.com.au/ai-is-a-great-coding-tool-but-it-is-still-vulnerable/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-is-a-great-coding-tool-but-it-is-still-vulnerable</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 31 Jul 2025 07:30:55 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Vulnerable Code]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9493</guid>

					<description><![CDATA[Artificial intelligence is rapidly changing the world as we know it. From writing articles to generating complex software code, AI is a powerful tool that offers incredible efficiency. However, it is crucial to remember that AI is not infallible, especially in the realm of cyber security. A recent report from Veracode has highlighted some alarming [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Why Hackers Want You to Keep Using That Cartoon Cyber Security Training</title>
		<link>https://www.vertexcybersecurity.com.au/why-hackers-want-you-to-keep-using-that-cartoon-cyber-security-training/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-hackers-want-you-to-keep-using-that-cartoon-cyber-security-training</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 31 Jul 2025 01:39:02 +0000</pubDate>
				<category><![CDATA[Training]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[cartoon]]></category>
		<category><![CDATA[cyber awareness training]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[cyber training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9491</guid>

					<description><![CDATA[In the ever-growing world of online training, there is a clear trend towards making learning as &#8220;engaging&#8221; as possible. This often involves the use of gamification, vibrant animations, and cartoons. While these elements can make for a more entertaining experience, we should ask a crucial question when it comes to a topic as serious as [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cybersecurity Training that Builds Trust, Not Frustration</title>
		<link>https://www.vertexcybersecurity.com.au/cybersecurity-training-that-builds-trust-not-frustration/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-training-that-builds-trust-not-frustration</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 06 Jan 2025 05:24:34 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Employee Engagement]]></category>
		<category><![CDATA[Holiday Season]]></category>
		<category><![CDATA[IT Policies]]></category>
		<category><![CDATA[Workplace Culture]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9120</guid>

					<description><![CDATA[Cybersecurity training that builds trust, not frustration in the workplace is essential, but the methods used to educate staff can make or break workplace culture. Yarra Council’s recent phishing simulation, though well-intentioned, demonstrated how easy it is to send a phishing email but how much harder it is to create a positive cyber culture. Phishing [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Ranges in Pen Testing: How they Enhance Cyber Security</title>
		<link>https://www.vertexcybersecurity.com.au/cyber-ranges-in-pen-testing-how-they-enhance-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-ranges-in-pen-testing-how-they-enhance-cyber-security</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 13 Mar 2024 00:57:11 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[cyber defence]]></category>
		<category><![CDATA[Cyber Range]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[security training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7721</guid>

					<description><![CDATA[Introduction In the fast-paced world of cyber security, staying ahead of threats is paramount. Cyber ranges in penetration tests have emerged as a pivotal tool in this battle. They simulate real-world scenarios, allowing professionals to hone their skills and identify vulnerabilities without risking actual systems. What is a Cyber Range? It is a simulated virtual [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How Hackers find your business</title>
		<link>https://www.vertexcybersecurity.com.au/how-hackers-find-your-business/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-hackers-find-your-business</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 08 Feb 2023 00:19:07 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[advertising for hackers]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber attacker]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hacker discovery]]></category>
		<category><![CDATA[hacker use seo]]></category>
		<category><![CDATA[hackers find business]]></category>
		<category><![CDATA[hackers use advertising]]></category>
		<category><![CDATA[seo for hackers]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5046</guid>

					<description><![CDATA[The internet is huge with billions of users and devices, so how does a hacker pick or select you for a Cyber attack? There are some key discovery methods the Cyber Attackers use and they include: The Automation network attack starts with a known critical vulnerability, which is then automated with code to test every [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Many Cyber Security vulnerabilities are because humans make mistakes</title>
		<link>https://www.vertexcybersecurity.com.au/many-cyber-security-vulnerabilities-are-because-humans-make-mistakes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=many-cyber-security-vulnerabilities-are-because-humans-make-mistakes</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 11 Jan 2023 23:46:00 +0000</pubDate>
				<category><![CDATA[Governance]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[cyber security vulnerabilities]]></category>
		<category><![CDATA[err is human]]></category>
		<category><![CDATA[errors]]></category>
		<category><![CDATA[human firewall]]></category>
		<category><![CDATA[humans]]></category>
		<category><![CDATA[mistakes]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4914</guid>

					<description><![CDATA[Mistakes in code are known to cause bugs and those bugs are known to cause security vulnerabilities. We also know other vulnerabilities are by design mistakes, setup/configuration mistakes or someone giving away access. Therefore humans are the cause for all the cyber security issues. So how do we secure an imperfect world? What proof is [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How to Influence Employee Cybersecurity Behavior</title>
		<link>https://www.vertexcybersecurity.com.au/how-to-influence-employee-cybersecurity-behavior/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-influence-employee-cybersecurity-behavior</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 24 Nov 2022 01:40:56 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4784</guid>

					<description><![CDATA[When it comes to protecting your organisation from cyber attacks, creating a culture of both safety and awareness can be crucial elements. Many business leaders have systems and tools in place to protect their networks, but struggle to get their employees to buy into security policies and best practices. This leaves organisations vulnerable, as employees [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>ACSC Warns Australian Businesses Against Russian Cyber Threats</title>
		<link>https://www.vertexcybersecurity.com.au/acsc-warns-australian-businesses-against-russian-cyber-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=acsc-warns-australian-businesses-against-russian-cyber-threats</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 23 Nov 2022 23:41:04 +0000</pubDate>
				<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[CREST]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4779</guid>

					<description><![CDATA[The Australian Cyber Security Centre (ACSC) has issued a warning to Australian businesses to protect against attacks being perpetrated by Russian cybercriminal groups. CREST ANZ board member and cyber security professional Ajay Unni stated that because of the distance between Australia and Russia, cyber attacks are the most effective way to “punish” Australia for its [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>3 Ways You Can Help your Cybersecurity Team Avoid Burnout</title>
		<link>https://www.vertexcybersecurity.com.au/3-ways-you-can-help-your-cybersecurity-team-avoid-burnout/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=3-ways-you-can-help-your-cybersecurity-team-avoid-burnout</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Tue, 15 Nov 2022 16:30:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4759</guid>

					<description><![CDATA[With the growing number of cyber attacks and the shortage of cybersecurity professionals worldwide, those in the industry are facing serious pressure and workloads that can lead to burnout.&#160; Workers suffering from burnout, particularly in the security space where attentiveness and critical thinking are key to protect organisations, pose risks for organisations, especially those in [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
