<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Network Security Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/network-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/network-security/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 23 Mar 2026 05:18:09 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Network Security Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/network-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The 29-Minute Race: Why Cyber Attackers are Moving Faster Than Ever</title>
		<link>https://www.vertexcybersecurity.com.au/the-29-minute-race-why-cyber-attackers-are-moving-faster-than-ever/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-29-minute-race-why-cyber-attackers-are-moving-faster-than-ever</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 00:05:50 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Breakout Time]]></category>
		<category><![CDATA[Cyber Attack Trends]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10364</guid>

					<description><![CDATA[Cyber attackers are moving through networks in under 29 minutes. Learn why breakout times are dropping and how your business can defend against high-speed threats.]]></description>
		
		
		
			</item>
		<item>
		<title>Bridging the Clouds: Amazon and Google Announce Major Multi-Cloud Connectivity Update</title>
		<link>https://www.vertexcybersecurity.com.au/bridging-the-clouds-amazon-and-google-announce-major-multi-cloud-connectivity-update/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bridging-the-clouds-amazon-and-google-announce-major-multi-cloud-connectivity-update</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 05:35:39 +0000</pubDate>
				<category><![CDATA[Hosting]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Google Cloud]]></category>
		<category><![CDATA[multi-cloud]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Technology News]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9924</guid>

					<description><![CDATA[AWS and Google Cloud have announced high-speed, interoperable network connectivity. Discover what this multi-cloud breakthrough means for your business resilience and security, and how Vertex can help you navigate the changes.]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing for Government Agencies: the Benefits</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-for-government-agencies-the-benefits/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-for-government-agencies-the-benefits</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 04 Dec 2024 18:21:42 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[Government Cybersecurity]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9053</guid>

					<description><![CDATA[Introduction Government agencies are high-value targets for cyber attacks due to their critical role in safeguarding sensitive information. Penetration testing, often called ethical hacking, plays a vital role in identifying and addressing security vulnerabilities before malicious actors exploit them. This blog explores the benefits of penetration testing for government agencies and why it’s essential for [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing Tools</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-tools/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-tools</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 27 Jun 2024 04:31:04 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Security Tools]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8295</guid>

					<description><![CDATA[Penetration testing, also known as ethical hacking, is essential in today’s cyber security landscape. It involves simulating cyber attacks to identify and fix security vulnerabilities before malicious hackers exploit them. This blog explores some of the most common penetration testing tools used by security professionals. Nmap Nmap (Network Mapper) is an open-source tool used for [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How to Prepare for a Penetration Test</title>
		<link>https://www.vertexcybersecurity.com.au/how-to-prepare-for-a-penetration-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-prepare-for-a-penetration-test</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 26 Jun 2024 01:46:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8289</guid>

					<description><![CDATA[Introduction In today&#8217;s digital world, protecting your business from cyber threats is crucial. One way to assess your security measures is through a penetration test, or pen test. This involves ethical hackers attempting to breach your systems to identify vulnerabilities. Preparing for a penetration test is essential for ensuring accurate and useful results. Here, we [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing is so Important for Cybersecurity</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-is-so-important-for-cybersecurity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-is-so-important-for-cybersecurity</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 21 Jun 2024 16:29:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8287</guid>

					<description><![CDATA[In today&#8217;s digital age, cybersecurity is more important than ever. With cyber threats constantly evolving, organisations must stay one step ahead. One of the most effective ways to do this is through penetration testing. Also known as pen testing, this proactive approach helps identify and fix vulnerabilities before attackers can exploit them. What is Penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Testing: The Basics</title>
		<link>https://www.vertexcybersecurity.com.au/penetration-testing-the-basics/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-the-basics</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 19 Jun 2024 08:45:45 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8283</guid>

					<description><![CDATA[In today&#8217;s digital age, safeguarding data and systems is crucial. One of the key practices in achieving this is penetration testing. Also known as ethical hacking or pen testing, this practice involves simulating cyber attacks on a system to identify vulnerabilities. In this blog, we will explore the essentials of pen testing, its importance, and [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>System Hardening in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/system-hardening-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=system-hardening-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 13 Jun 2024 19:35:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[System Hardening]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8264</guid>

					<description><![CDATA[In today&#8217;s digital age, cyber security is paramount. One critical aspect is system hardening in penetration testing. This process involves securing a system by reducing its surface of vulnerability. Here, we explore the importance, techniques, and benefits of network hardening. What is System Hardening? System hardening, also known as security hardening, network hardening or IT [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Third-Party Penetration Testing: The Essential Guide</title>
		<link>https://www.vertexcybersecurity.com.au/third-party-penetration-testing-the-essential-guide/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=third-party-penetration-testing-the-essential-guide</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Sun, 09 Jun 2024 08:45:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[third-party testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8260</guid>

					<description><![CDATA[In today&#8217;s digital age, cybersecurity is more crucial than ever. Organisations must protect their networks and data from potential threats. One effective way to achieve this is through third-party penetration testing. This method involves hiring external experts to test your system&#8217;s security. What is Third-Party Penetration Testing? Third-party penetration testing, also known as external penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>DDoS Testing in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/ddos-testing-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ddos-testing-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 05 Jun 2024 09:53:20 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DDoS Testing]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8251</guid>

					<description><![CDATA[Introduction In today’s digital age, cybersecurity is paramount. One significant aspect of this is ensuring your systems can withstand a Distributed Denial of Service (DDoS) attack. DDoS testing, an integral part of penetration testing, helps organisations identify vulnerabilities and strengthen their defences. This blog delves into the importance, process, and benefits of DDoS testing in [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
