Blog Details

Opinion: Post Quantum Cryptography – So What?

In a recent LinkedIn post, I outlined four simple questions to help leaders assess whether Post Quantum Cryptography (PQC) warrants a place on their agenda, and how urgently. The piece draws on Mosca’s theorem and covers the practical realities most organisations have not yet confronted. You can read the full post below. If your organisation […]

Case Study: Essential Eight Assessment Capability

A managed service provider supporting over 50 customers was facing a familiar challenge: growing demand for Essential Eight assessments, but no scalable way to deliver them consistently. Artefakt was engaged to change that. Our consultant designed a structured methodology supported by automation that reduced assessment effort by approximately 50%, while improving quality and tailoring reporting […]

ESA Series: Standards Reference Model

A Standards Reference Model organises security standards into topic-aligned collections that correspond to organisational reality. These create coherence across regulatory, contractual, and policy requirements. Well-drawn topic boundaries enable teams to identify relevant requirements and understand accountability directly. This publication opens Artefakt’s Enterprise Security Architecture series. It explores structural and organisational decisions that deliver clear, navigable, […]

GRC Series: Supply Chain Contracts

Supply chain contracts are one of the most consequential opportunities an organisation has to shape its security posture across the extended enterprise. The value of well-constructed security obligations lies in shaping supplier behaviour throughout the engagement, long before an incident tests them. The first in our GRC series, this short paper examines the principles and […]

Opinion: IRAP – The new de facto?

Although IRAP and Essential Eight assessments aren’t yet formal mandates for the private sector, their steady rise signals an emerging standard for Australian cybersecurity practices. As someone who’s spent many years working with information security frameworks, I keep an eye on the subtle but meaningful shifts in our industry. Recently, one observation has stood out: […]