<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/security/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 23 Mar 2026 05:18:40 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Security Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why the War in Iran Demands Decisive Government Action</title>
		<link>https://www.vertexcybersecurity.com.au/why-the-war-in-iran-demands-decisive-government-action/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-the-war-in-iran-demands-decisive-government-action</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 12:12:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Resilience]]></category>
		<category><![CDATA[Energy Security]]></category>
		<category><![CDATA[Housing Right]]></category>
		<category><![CDATA[Inflation]]></category>
		<category><![CDATA[War in Iran]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10374</guid>

					<description><![CDATA[Explore why the war in Iran necessitates urgent government decisions on housing as a right, local energy, and resource taxation to secure national productivity.]]></description>
		
		
		
			</item>
		<item>
		<title>The Risk-Prepared Backpack: Essential Items for Navigating the Unexpected</title>
		<link>https://www.vertexcybersecurity.com.au/the-risk-prepared-backpack-essential-items-for-navigating-the-unexpected/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-risk-prepared-backpack-essential-items-for-navigating-the-unexpected</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 12:30:11 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[emergency backpack]]></category>
		<category><![CDATA[everyday carry]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Risk preparedness]]></category>
		<category><![CDATA[survival essentials]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10228</guid>

					<description><![CDATA[Discover the essential items to pack in your backpack for effective risk management. From satellite connectivity to analog tools, learn how to be prepared for life's unexpected curveballs.]]></description>
		
		
		
			</item>
		<item>
		<title>Greyware in Penetration Testing: Beware of the Hazards</title>
		<link>https://www.vertexcybersecurity.com.au/greyware-in-penetration-testing-beware-of-the-hazards/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=greyware-in-penetration-testing-beware-of-the-hazards</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 02 May 2024 01:04:09 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Greyware Testing]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Malware Detection]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7907</guid>

					<description><![CDATA[Introduction In the intricate realm of cyber security, penetration testing stands out as a crucial technique for strengthening system security. Among various threats, greyware—software that isn&#8217;t outright malicious but can undermine performance and security—poses unique challenges. This blog delves into the importance of greyware testing within penetration testing frameworks, outlining key strategies and considerations. Understanding [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Security Budget for FY24: What does your business stand to lose?</title>
		<link>https://www.vertexcybersecurity.com.au/what-does-your-business-stand-to-lose/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-does-your-business-stand-to-lose</link>
		
		<dc:creator><![CDATA[Melanie]]></dc:creator>
		<pubDate>Sun, 28 May 2023 13:44:46 +0000</pubDate>
				<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[costs]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber budget]]></category>
		<category><![CDATA[cyber incident]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[financial year]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[planning]]></category>
		<category><![CDATA[Proactive Defence]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5972</guid>

					<description><![CDATA[As you start to finalise your Cyber Security Budget for FY24, ask yourself what a cyber attack might cost your business? In 2022, the Australian Cyber Security Centre reported that the average cost per cyber report was between $39,000 and $88,000 for small to medium sized businesses. However this cost is likely understated and does not include [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Enumeration In Penetration Testing?  What is it?</title>
		<link>https://www.vertexcybersecurity.com.au/enumeration-in-penetration-testing-what-is-it/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=enumeration-in-penetration-testing-what-is-it</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 06 Apr 2023 01:58:04 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[Enumeration]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5672</guid>

					<description><![CDATA[Enumeration is the process of gathering information about a target system or network during a penetration testing exercise. It is one of the most important and time-consuming phases of a penetration test, as it helps to identify vulnerabilities that could be exploited to gain unauthorised access to the system or network. Enumeration involves actively probing [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Scanning In Penetration Testing &#8211; An Introduction</title>
		<link>https://www.vertexcybersecurity.com.au/scanning-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=scanning-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 03 Apr 2023 02:23:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[scanning]]></category>
		<category><![CDATA[scanning in penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5637</guid>

					<description><![CDATA[Scanning is an essential step in the penetration testing process that involves identifying and mapping the network and system architecture of the target environment. Penetration testing is a crucial aspect of cybersecurity that involves simulating real-world attacks to identify vulnerabilities and assess the overall security posture of an organisation&#8217;s systems and infrastructure. Scanning in penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Reconnaissance In Penetration Testing &#8211; Everything You Need To Know</title>
		<link>https://www.vertexcybersecurity.com.au/reconnaissance-in-penetration-testing-everything-you-need-to-know/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reconnaissance-in-penetration-testing-everything-you-need-to-know</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 31 Mar 2023 02:59:27 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[active reconnaissance]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Maltego]]></category>
		<category><![CDATA[Metasploit]]></category>
		<category><![CDATA[Nmap]]></category>
		<category><![CDATA[Passive Reconnaissance]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[recon-ng]]></category>
		<category><![CDATA[reconnaissance]]></category>
		<category><![CDATA[Shodan]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5630</guid>

					<description><![CDATA[Reconnaissance is the first phase of a penetration testing engagement. It involves gathering information about the target system or network that is going to be tested. The goal of reconnaissance is to gather as much information as possible about the target so that the penetration tester can understand the target system&#8217;s architecture, identify potential vulnerabilities, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Everything You&#8217;ve Ever Wanted to Know About Penetration Testing Methodology</title>
		<link>https://www.vertexcybersecurity.com.au/everything-youve-ever-wanted-to-know-about-penetration-testing-methodology/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=everything-youve-ever-wanted-to-know-about-penetration-testing-methodology</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 22:33:19 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5615</guid>

					<description><![CDATA[Penetration testing methodology is a systematic approach to identify vulnerabilities and assess the security of an organisation’s network, applications, and infrastructure. The methodology is a standard process that security professionals follow to perform penetration testing, which involves simulating an attack on a network or system to detect weaknesses and assess the level of risk posed [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>What is White-Box Penetration Testing?</title>
		<link>https://www.vertexcybersecurity.com.au/what-is-white-box-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-white-box-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Sun, 26 Mar 2023 23:41:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[White-Box Penetration Testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5610</guid>

					<description><![CDATA[White-box penetration testing is a type of security testing that involves a complete understanding of the system or network being tested. It is also known as transparent box testing, clear box testing, and structural testing. In this testing, the tester has complete knowledge about the internal workings of the system, such as source code, architecture, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>An Introduction to Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/an-introduction-to-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=an-introduction-to-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Mon, 20 Mar 2023 01:54:43 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[penetration test]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5529</guid>

					<description><![CDATA[Penetration testing, or pen-testing for short, is a simulated cyber-attack that aims to identify and exploit vulnerabilities in a system or network to evaluate the security of the system. Penetration testing is a critical security measure that organizations use to assess the effectiveness of their security defenses against external attacks. This article provides an overview [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
