Welcome to the 
Tarian Cyber blog

OUR BLOG

Security Operations

A large amount of the incidents we are called in to respond to are Business Email Compromise (BEC) attacks. From that BEC, we quickly establish that the initial attack vector is an AiTM attack. So what is it? – Good question, but first, let’s look at the attack surface. Business Email Compromise incidents are typically […]

What is an adversary-in-the-middle attack?

Threat Intelligence

Hacktivism has been around for decades, from the likes of Anonymous to the state-backed groups operating in response to the Russo-Ukrainian conflict, and their goals have always been the same, while their motivations may vary.

The rising capabilities of Hacktivist groups threatening Australia

Security Operations
Skyscraper

The CSCAU site states that SMB1001 is a multi-tiered cyber security certification standard. This standard comprises five tiers that support an organisation in their journey of developing their cyber security hygiene from the Starter to Champion tier.

A new standard for a new era – SMB1001

Endpoint Security
Man using laptop

The most common incident we have responded to since the inception of Tarian Cyber, similar to most Incident Response firms, is Business Email Compromise (BEC).

Multi-Factor Authentication – it is not your saviour (yet)

*and we’ll definitely get along well if your name starts with ‘J’

Financial Controller

Josh
Robertson

SENIOR ANALYST

Jude
Cubby

Cyber Operations Manager

Jack Barry

Managing DirectOR
+ Founder

Jon
Robertson

Tarian Cyber offers an unmatched depth of capability and expertise earned through personal commitment and industry recognition. It’s in the collective 'we' — where each team member is a highly skilled specialist in their own right — that drives our success. Together, we are united in building cyber resilience, and delivering security solutions our clients can depend on and value.

Our Leadership Team

SUCCESS STORIES

We're not kidding. It's all true. See our strategic thinking in action, and how we’ve tackled complex cyber security challenges for leading organisations.

Our Stories.

EXPLORE SOLUTIONS

From developing tailored strategies to delivering robust defences, our services encompass every aspect of cyber security.

Our Solutions.