Author

David Bingham

David Bingham is Security Sales Manager for The Missing Link’s Southern Region, where he leads with energy, empathy and a love of complex problem-solving. Known for blending strategic thinking with a passion for people, David creates space for his team—and clients—to thrive. He’s all about building trust, tackling cyber security challenges head-on, and keeping the conversation real (and fun). Whether he’s in a high-rise talking strategy or behind the decks as Melbourne techno DJ Obsessive Behaviour, David brings the same sharp focus, infectious energy and creative spark to everything he does.

Cyber Security Understanding incident metrics: MTTD and MTTR

Attackers are getting faster, stealthier and harder to stop. In this high-stakes environment, speed isn’t just a technical metric—it’s a survival... Read more

Cyber Security A practical approach to modern Data Security

This article was originally published on TechDay Read more

Cyber Security Are you really securing your customer data?

This blog post was contributed by Paul Friend, Security Account Director at The Missing Link. It was originally posted on his LinkedIn profile. You... Read more

Cyber Security Why you should care about the Google Chrome UX (CrUX) report

By now, you should know that a faster website makes your clients happy, they buy more, and they engage more with your content. However, one client in... Read more

What is Service Delivery for the Security Operations Centre?

So, you’ve just signed off on a new Managed Service. Now what? Read more

Cyber Security How to master email security with DMARC

This blog is the final part of three in our blog series on DMARC. Read more

Cyber Security A closer look at how DMARC works

This blog is part two of three in our blog series on DMARC. Now that you know the basics of Domain-Based Message Authentification Reporting and... Read more

Cyber Security What is SPF, DKIM and DMARC?

This blog is part one of three in our blog series on DMARC. We've all received an email that looks like it's from an employee or client, but upon... Read more

Cyber Security 4 immediate steps against the Copy-paste compromise

The Prime Minister today publicly highlighted the increasing cyber security threats posed by state sponsored actors to Australian businesses and... Read more

Cyber Security SASE: the future framework for network security

Modern workplace strategies are one of the driving forces behind digital transformation as enterprises work towards enabling their employees to work... Read more

Cyber Security The best practices of Administrative Privilege Management

This is the final blog in our series on the ASD Essential Eight, and we’ve kept a crucial element for last – administrative privilege management.... Read more

Cyber Security MFA: how it works & why you need it

Multi-Factor Authentication: The essentials As part of our ongoing series on the ASD Essential Eight, today, we are looking at Multi-Factor... Read more