<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity strategy Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/cybersecurity-strategy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/cybersecurity-strategy/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 15 Sep 2025 05:30:29 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>cybersecurity strategy Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/cybersecurity-strategy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Did an IT or Cyber Provider Try to Sell You a SOC Service?</title>
		<link>https://www.vertexcybersecurity.com.au/did-an-it-or-cyber-provider-try-to-sell-you-a-soc-service/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=did-an-it-or-cyber-provider-try-to-sell-you-a-soc-service</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 03:10:13 +0000</pubDate>
				<category><![CDATA[Security Operations Center]]></category>
		<category><![CDATA[Security Operations Centre]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity strategy]]></category>
		<category><![CDATA[IT Provider]]></category>
		<category><![CDATA[Log Monitoring]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Vertex Cyber Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9647</guid>

					<description><![CDATA[In the world of cybersecurity, there is a vast array of services and solutions, each promising to be the key to protecting your business. One service that is often presented as the ultimate defence is a Security Operations Centre, commonly known as a SOC. If you have been in discussions with an IT provider, a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Phishing Testing Vendors: You Need Someone Secure</title>
		<link>https://www.vertexcybersecurity.com.au/insecure-phishing-testing-platforms-selecting-the-right-secure-vendor/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=insecure-phishing-testing-platforms-selecting-the-right-secure-vendor</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 26 Apr 2024 07:57:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[SOC2]]></category>
		<category><![CDATA[cybersecurity strategy]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[phishing testing]]></category>
		<category><![CDATA[vendor security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7854</guid>

					<description><![CDATA[Phishing testing vendors can introduce significant risks to your organisation if they are not secure and trustworthy. Phishing testing is an important component in cyber security strategies. Discover the risks of insecure phishing vendors and understand how ISO 27001 and SOC2 certifications safeguard your data security.By simulating phishing attacks, organisations can identify vulnerabilities in their [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
