Australian. Cyber. Security.
We deliver capabilities which improve security posture, defend against cyber crime and improve business operations.
About luminol
Our Story
We are a 100% Australian veteran owned and operated company, founded and based in Adelaide. Our staff have been protecting Australian Defence, Intelligence and Law enforcement for almost three decades.
We live Cyber security, not ICT.
We collect, process and disseminate Threat Intelligence. We automate systems and processes for countering cyber crime, in the cloud and at machine speed, enabling our clients to protect their critical information and manage their Cyber maturity profile.
We do this to protect Australian information.
- Curated Threat Intelligence
- Proven cybercrime disruption
- Australian owned, Australian operated
- Sovereign capability, sovereign responsibility
Protecting information at all levels and industries
Cloud based, always operational, always defending
What Clients Say
Latest Posts
Essential Eight #4: Restrict Administrative Privileges
This article is the fourth in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. The first three Essential Eight strategies focus on preventing attackers from
Essential Eight #1: Patch Applications
This article is the first in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. Software is never finished. Every application in use across a business
Using email aliases to strengthen personal security.
Everything in security is ‘Strength in depth’. This means there is more than one necessary process to secure a ‘thing’. Email requires DKIM, SPF and MFA. DNS should have DoH, RPZ and load balancing to multiple servers. BL,UF: Ask Luminol
What is DNS security?
DNS security is the practice of protecting DNS infrastructure from cyber attacks in order to keep it performing quickly and reliably. An effective DNS security strategy incorporates a number of overlapping defenses, including establishing redundant DNS servers, applying security protocols like DNSSEC,
Essential Eight #4: Restrict Administrative Privileges
This article is the fourth in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. The first three Essential Eight strategies focus on preventing attackers from
Essential Eight #1: Patch Applications
This article is the first in an eight-part series examining the Australian Cyber Security Centre’s Essential Eight — a baseline set of mitigation strategies recommended for all Australian organisations. Software is never finished. Every application in use across a business
Using email aliases to strengthen personal security.
Everything in security is ‘Strength in depth’. This means there is more than one necessary process to secure a ‘thing’. Email requires DKIM, SPF and MFA. DNS should have DoH, RPZ and load balancing to multiple servers. BL,UF: Ask Luminol
What is DNS security?
DNS security is the practice of protecting DNS infrastructure from cyber attacks in order to keep it performing quickly and reliably. An effective DNS security strategy incorporates a number of overlapping defenses, including establishing redundant DNS servers, applying security protocols like DNSSEC,
We provide solutions to defend your business.
We’ve protected information for Law enforcement, Intelligence and Defence agencies.
Contact us now to learn how we can use our expertise to protect your information from cyber threats.