Australian. Cyber. Security.

We deliver capabilities which improve security posture, defend against cyber crime and improve business operations.

About luminol

Our Story

We are a 100% Australian veteran owned and operated company, founded and based in Adelaide. Our staff have been protecting Australian Defence, Intelligence and Law enforcement for almost three decades.

We live Cyber security, not ICT.

We collect, process and disseminate Threat Intelligence. We automate systems and processes for countering cyber crime, in the cloud and at machine speed, enabling our clients to protect their critical information and manage their Cyber maturity profile.

We do this to protect Australian information.

SOLUTIONS

Protecting information at all levels and industries

Intelligence

Protective DNS

Threat Hunting

Credentials

Breach Monitoring

Cyber Hygiene

SERVICES

Cloud based, always operational, always defending

Cyber Threat Intelligence

Cyber Threat Defence

Cyber Incident Response

TESTIMONIALS

What Clients Say

NEWS

Latest Posts

Essential Eight #4: Restrict Administrative Privileges

This article is the fourth in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. The first three Essential Eight strategies focus on preventing attackers from

Essential Eight #1: Patch Applications

This article is the first in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. Software is never finished. Every application in use across a business

Using email aliases to strengthen personal security.

Everything in security is ‘Strength in depth’. This means there is more than one necessary process to secure a ‘thing’. Email requires DKIM, SPF and MFA. DNS should have DoH, RPZ and load balancing to multiple servers. BL,UF: Ask Luminol

What is DNS security?

DNS security is the practice of protecting DNS infrastructure from cyber attacks in order to keep it performing quickly and reliably. An effective DNS security strategy incorporates a number of overlapping defenses, including establishing redundant DNS servers, applying security protocols like DNSSEC,

Essential Eight #4: Restrict Administrative Privileges

This article is the fourth in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. The first three Essential Eight strategies focus on preventing attackers from

Essential Eight #1: Patch Applications

This article is the first in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. Software is never finished. Every application in use across a business

Using email aliases to strengthen personal security.

Everything in security is ‘Strength in depth’. This means there is more than one necessary process to secure a ‘thing’. Email requires DKIM, SPF and MFA. DNS should have DoH, RPZ and load balancing to multiple servers. BL,UF: Ask Luminol

What is DNS security?

DNS security is the practice of protecting DNS infrastructure from cyber attacks in order to keep it performing quickly and reliably. An effective DNS security strategy incorporates a number of overlapping defenses, including establishing redundant DNS servers, applying security protocols like DNSSEC,

We provide solutions to defend your business.

We’ve protected information for Law enforcement, Intelligence and Defence agencies.

Contact us now to learn how we can use our expertise to protect your information from cyber threats.