
Case study: data loss detection for national law firm
Case study: data exfiltration detection for national law firm Customer: National Australian law firm Service: Implementation of data exfiltration detections for Splunk Enterprise Security (ES)

Case study: data exfiltration detection for national law firm Customer: National Australian law firm Service: Implementation of data exfiltration detections for Splunk Enterprise Security (ES)

CASE STUDY: IRAP Compliance We’ve compiled a case study that summarises 18 months of very challenging, rewarding and ultimately successful work, guiding the development of

DLL Side loading – Part 2 This is part two of our two-part blog post, describing our investigation into the process that attackers use when

cyber news and updates In this month’s newsletter, we we cover off on: Further fake job-applicant news, now with AI and LOLs. Some more work

USING SAQ A TO reduce your pci dss reporting load PCI DSS compliance reporting loads can be heavy going. Do you enjoy lots of PCI

Managed SOC/SIEM use cases This video walks us through four SIEM case studies that show how SIEM can strengthens security operations and prevent costly incidents. Take

DLL Side loading – Part 1 This blog post is a result of our investigation into the process that attackers use when sideloading malicious DLLs

ASIC sues FIIG for systemic and prolonged security failures We’ve all heard the saying: “You can lead a horse to water but you can’t make

SIEM solutions for incident management – Use cases This article examines practical use cases: How we’ve used SIEM solutions for incident management. It demonstrate how

How to undermine your pCI DSS compliance efforts When it comes to PCI DSS compliance, most organisations focus on technical controls such as firewalls, encryption,

Is your candidate real? North Korea scams In May 2024, the U.S. Department of Justice unsealed charges against individuals involved in schemes where overseas IT

Abusing Internet shortcuts for access and persistence Internet shortcut (.url) files are traditionally used to link to an (Internet-based) URL on Windows systems and trigger
If your organisation needs reliable penetration testing, meaningful SIEM/MDR services or practical GRC support, DotSec delivers. Our team combines senior engineering capability with ISO 27001 and PCI DSS expertise to provide clear, actionable outcomes backed by more than 25 years of proven experience.
Practical and experienced Australian ISO 27001 and ISMS consulting services. We will help you to establish, implement and maintain an effective information security management system (ISMS).
DotSec’s penetration tests are conducted by experienced, Australian testers who understand real-world attacks and secure-system development. Clear, actionable recommendations, every time.
dotSec stands out among other PCI DSS companies in Australia: We are not only a PCI QSA company, we are a PCI DSS-compliant service provider so we have first-hand compliance experience.
Web Application Firewalls (WAFs) are critical for protecting web applications and services, by inspecting and filtering out malicious requests before they reach your web servers
Multi-Factor Authentication (MFA) and Single Sign-On (SSO) reduce password risks, simplify access, letting verified and authorised users reach sensitive systems, services and apps.
dotSec provides comprehensive vulnerability management services. As part of this service, we analyse findings in the context of your specific environment, priorities and threat landscape.
We don’t just test whether users will click a suspicious link — we also run exercises, simulating phishing attacks that are capable of bypassing multi-factor authentication (MFA) protections.
DotSec’s penetration testing services help you identify and reduce technical security risks across your applications, cloud services and internal networks. Clear, actionable recommendations, every time!
dotSec has provided Australian managed SOC, SIEM and EDR services for 15 years. PCI DSS-compliant and ISO 27001-certified. Advanced log analytics, threat detection and expert investigation services.
We provide prioritised, practical guidance on how to implement secure configurations properly. Choose from automated deployment via Intune for Windows, Ansible for Linux or Cloud Formation for AWS.
Secure web hosting is fundamental to protecting online assets and customer data. We have over a decade of AWS experience providing highly secure, scalable, and reliable cloud infrastructure.
DotSec helps organisations to benefit from the ACSC Essential Eight by assessing maturity levels, applying practical security controls, assessing compliance, and improving resilience against attacks.
Evaluation against the CIS 18 Controls establishes a clear baseline for stakeholders, supporting evidence-based planning, budgeting, maturity-improvement and compliance decisions
We have over 25 years of cyber security experience, providing practical risk-based guidance, advisory and CISO services to a wide range of public and private organisations across Australia.