Resources

LinearStack Blogs

Insights on emerging cybersecurity threats, attack vectors and vulnerabilities, and tips to stay safe in a digitised world.
Explore Blogs
Latest Blog

Cyber Insurance: A Safety Net, Not a Substitute, for Security

Enhancing Security Layers: Why Cyber Insurance is Part of a Bigger Cybersecurity Picture
Read More
Latest Blog

Avoid the Bait: Mastering the Prevention of Phishing Scams

Empower Your Defenses: Essential Strategies to Outsmart Phishing Schemes
Read More
blogs

Reader's Corner

Insights on emerging cybersecurity threats, attack vectors and vulnerabilities, and tips to stay safe in a digitized world.

How to Develop Key Performance and Risk Indicators for Your Security Program?

Developing qualitative & quantitative risk models help organisations understand overall risk and the possible impact.
Read More

What is Attack Surface Management?

Attack surface management (ASM) is the continuous process of identifying and addressing cybersecurity vulnerabilities.
Read More

The Zero Trust Security Model

How zero trust security protects businesses from advanced threats and how to implement it in your organisation
Read More

Zero Trust Architecture Strategy - Memorandum

US Government memorandum on moving Federal agencies and departments towards zero trust cyber security principles
Read More

When to Leverage the Negative vs Positive Security Model

Ransomware is a threat all organisations face however, it is preventable. Read what you can do to prevent
Read More

What are Quantitative and Qualitative Risk Assessments?

Understanding cybersecurity challenges in 2023 with Quantitative and Qualitative risk assessments.
Read More

What is the ACID Compliance Framework?

Elements of the ACID framework, risks, and help.
Read More

What is the Role of Honeypots in Cybersecurity Defense?

Leveraging honeypots in your environment
Read More

What is Extended Detection and Response (XDR)?

Forrester defines XDR as : The evolution of EDR, which optimizes threat detection, investigation, response, and hunting in real time….a cloud-native platform to provide security teams with flexibility, scalability, and opportunities for automation.
Read More

Managed Detection and Response (MDR) to stop Supply Chain Attacks

Minimising supply chain risks and reducing impact with Managed Detection and Response (MDR)
Read More

Security Orchestration, Automation and Response - An Introduction to SOAR

How SOAR platforms help cyber security teams optimise operations and reduce response time
Read More

Third-Party Cyber Risk Management

A brief introduction to supply chain cyber risk management and why ongoing vendor risk assessment at all stages of engagement is so important.
Read More

Requirements for Cybersecurity Insurance

Cert NZ : $3.9 million in direct financial loss was reported in Q2.
Read More

Security Awareness

Workforce Security Awareness is an Investment in your business
Read More

Ransomware Trends 2021 - CISA, ACSC, NCSC Joint Advisory

Cyber security agencies in the US, UK and Australia release joint advisory on increasing threat of ransomware
Read More

Ransomware - Prevention and Mitigation

Understanding ransomware and how to build a strong defensive net to protect your data from cybercriminals
Read More

Preventing Data Diddling and Salami Attacks

Data diddling is one of the most difficult attacks to detect.
Read More

Phishing - Prevention, Detection & Mitigation

How to detect and mitigate phishing attacks, and why every organisation must have a phishing awareness program for employees
Read More
Get in touch

Get a quote now

Don't take any chances with the security of your business. Choose our Managed DNS security service and secure your business with the peace of mind that comes from working with the experts at LinearStack. Contact us today to learn more and get started.
Keep your business safe by protecting your networks.
A deep understanding of how hackers operate
In-depth threat analysis and advice you can trust
Avg. >9/10 customer satisfaction, 95% retention rate
Multi award-winning offensive security services
I prefer to be contacted by :
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Are you experiencing a security issue? Call us now.