Author

David Bingham

David Bingham is Security Sales Manager for The Missing Link’s Southern Region, where he leads with energy, empathy and a love of complex problem-solving. Known for blending strategic thinking with a passion for people, David creates space for his team—and clients—to thrive. He’s all about building trust, tackling cyber security challenges head-on, and keeping the conversation real (and fun). Whether he’s in a high-rise talking strategy or behind the decks as Melbourne techno DJ Obsessive Behaviour, David brings the same sharp focus, infectious energy and creative spark to everything he does.

Cyber Security Assessing your workforce: Why your team might be your biggest risk

It’s widely recognised that human error is one of the most significant risks facing enterprise security today. Security leaders are well aware of the... Read more

Cyber Security The 5-step workforce security assessment: How to strengthen your cyber resilience

The biggest vulnerability in your cybersecurity strategy isn’t hidden in your infrastructure, it’s sitting at a desk (or working from home).... Read more

Cyber Security Behind the screens: What is SOC Service Delivery?

So, you’ve just signed off on a new Managed Service. Now what? Read more

Cyber Security Understanding incident metrics: MTTD and MTTR

Attackers are getting faster, stealthier and harder to stop. In this high-stakes environment, speed isn’t just a technical metric—it’s a survival... Read more

Cyber Security Penetration testing vs. vulnerability scanning for the public sector

Are vulnerability assessments giving your organisation a false sense of security? Ian Otieno, Cyber Security Account Director at The Missing Link... Read more

Cyber Security A practical approach to modern Data Security

This article was originally published on TechDay Read more

Cyber Security Are you really securing your customer data?

This blog post was contributed by Paul Friend, Security Account Director at The Missing Link. It was originally posted on his LinkedIn profile. You... Read more

Cyber Security Why you should care about the Google Chrome UX (CrUX) report

By now, you should know that a faster website makes your clients happy, they buy more, and they engage more with your content. However, one client in... Read more

Cyber Security How to master email security with DMARC

This blog is the final part of our 3-part series on DMARC email security. Read Part 1: What is SPF, DKIM and DMARC? Read Part 2: A closer look at how... Read more

Cyber Security A closer look at how DMARC works

This blog is Part 2 in our 3-part series on DMARC email security. In Part 1, we explored the foundations of DMARC and how it builds on SPF and DKIM... Read more

Cyber Security What is SPF, DKIM and DMARC?

This blog is Part 1 in our 3-part series on DMARC email security. Read more

Cyber Security 4 immediate steps against the Copy-paste compromise

The Prime Minister today publicly highlighted the increasing cyber security threats posed by state sponsored actors to Australian businesses and... Read more