<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>risk Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/risk/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Thu, 06 Nov 2025 03:42:57 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>risk Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/risk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Are You Relying on General AI for Your Cyber Security? Why That Could Be a Major Mistake</title>
		<link>https://www.vertexcybersecurity.com.au/are-you-relying-on-general-ai-for-your-cyber-security-why-that-could-be-a-major-mistake/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-relying-on-general-ai-for-your-cyber-security-why-that-could-be-a-major-mistake</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 30 Oct 2025 23:53:48 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Averaging Machine]]></category>
		<category><![CDATA[chatgpt]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Data Poisoning]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9782</guid>

					<description><![CDATA[Are you using a general AI chatbot for your cyber security? Discover why this "averaging machine" fails in an adversarial game and how to use specialised AI correctly.]]></description>
		
		
		
			</item>
		<item>
		<title>The Vertex Penetration Testing Difference</title>
		<link>https://www.vertexcybersecurity.com.au/the-vertex-penetration-testing-difference/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-vertex-penetration-testing-difference</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 11 Sep 2019 19:28:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=780</guid>

					<description><![CDATA[The Vertex Penetration Testing difference lies in our proven expertise and the human experience we provide. We see ourselves as a partner to our clients not just a report generator. We find 20% more vulnerabilities than all our competitors, and we know that it only takes one sub-par security practice to bring a business to [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>What Are Cyber Attackers After And What Part Of Your Business Is At Risk?</title>
		<link>https://www.vertexcybersecurity.com.au/what-are-cyber-attackers-after-and-what-part-of-your-business-is-at-risk/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-are-cyber-attackers-after-and-what-part-of-your-business-is-at-risk</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 02 Aug 2019 22:07:20 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=744</guid>

					<description><![CDATA[Cyber attackers are usually either agenda driven and/or financially motivated, so they are generally after theft of intellectual property or strategic plans as well as financial fraud. The parts of your business that are most at risk are business intelligence and sales and marketing data. However, don’t forget to take into consideration your business’s reputation [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>New Cybersecurity Threats in 2019</title>
		<link>https://www.vertexcybersecurity.com.au/new-cybersecurity-threats-in-2019/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-cybersecurity-threats-in-2019</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 02 Aug 2019 21:13:12 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[mobile plan hacking]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=739</guid>

					<description><![CDATA[Internet of Things (IoT) Device Threats Businesses are now offering more and more devices to their solutions and a lot of these devices don’t have security plans in place. Companies that want to stay safe should implement a process and management for updating all IoT devices.&#160;&#160;&#160; Geopolitical Risks If your business data is stored offshore [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Security is not Insurance</title>
		<link>https://www.vertexcybersecurity.com.au/cyber-security-not-insurance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-security-not-insurance</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 30 Nov 2016 05:28:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=591</guid>

					<description><![CDATA[Let&#8217;s get it straight, Cyber Security (IT Security) is not the same as Insurance (sometimes named &#8220;Cyber Security Insurance&#8221;). What is Insurance Insurance is a post-incident payment to counter the impact of a negative event. In other words, you will get money if you are insured when the insured item goes wrong.  However, insurance won&#8217;t [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Should Vendors and Governments get involved in device security</title>
		<link>https://www.vertexcybersecurity.com.au/vendors-governments-involvement-device-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vendors-governments-involvement-device-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 07 Oct 2016 01:18:46 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=585</guid>

					<description><![CDATA[Many products today have computers within them. This now includes TVs, fridges, air conditioners, cars, DVD players, printers, alarm clocks, cameras, lights, watches, phones and many more. Some of these are connected to other devices or the Internet and hence called IoT (Internet of Things). If any of these devices have a dangerous flaw, they [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
