by Gagan Gulati | Jan 30, 2026 | Artificial Intelligence, Cyber Resilience, Data Management, Governance & Risk
2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this evolution, I have noted three...
by The Production Team | Jan 29, 2026 | Personal Security, Security Awareness, Threat Intelligence
Over the last month, Barracuda threat analysts have investigated the following email threats targeting organisations and their employees: Tycoon phishing kit using QR codes built out of HTML tables Callback phishing through Microsoft Teams Facebook-themed...
by Morey Haber | Jan 28, 2026 | Identity & Access Management, Learning & Education, Risk Management
In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is...
by Craig Ford | Jan 27, 2026 | Personal Security
In today’s modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter...
by Agnidipta Sarkar | Jan 21, 2026 | Cyber Resilience, Microsegmentation, Security Operations
I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos...
by Maaz Yasin | Jan 20, 2026 | Encryption & Cipher, Executive Communication, National Security, Secure Communications
Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with...
by Vanta | Jan 15, 2026 | Compliance & Legal, Exposure Management, Governance & Risk, Risk Management, Security Operations
Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally...
by Greg Sullivan | Jan 15, 2026 | Leadership, Security Operations, Work & Careers
The ceaseless nature and high sophistication of today’s AI-driven cyber threats are unrelenting and daunting. An alarmingly high 85% of cybersecurity professionals anticipate leaving their jobs due to burnout. Burnout impacts our most important line of defense – our...
by Sam Salehi | Jan 14, 2026 | Risk Management
As we head into 2026, cybersecurity leaders are facing a paradox. Organisations have never invested more in security tools, data and talent – yet many CISOs admit they have less confidence in their true risk posture than ever before. The problem isn’t a lack of...
by Paul Zimski | Jan 12, 2026 | Executive Communication, Leadership, Secure Communications
For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over...
by Christine Gadsby | Jan 6, 2026 | Encryption & Cipher, Executive Communication, Secure Communications
In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned...
by Vanta | Jan 5, 2026 | Compliance & Legal, Governance & Risk, Leadership, Security Operations
Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools,...
by Agnidipta Sarkar | Dec 22, 2025 | Microsegmentation, Reports & Predictions, Security Operations, Zero Trust
As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For...
by Vanta | Dec 19, 2025 | Compliance & Legal, Executive Communication, Risk Management
Introduction For today’s Chief Information Security Officers (CISOs), compliance is no longer a once-a-year headache, it’s a continuous, evolving mandate. As threat landscapes shift and regulatory frameworks grow more complex, businesses are being called to do more...
by Sumir Bhatia | Dec 18, 2025 | Artificial Intelligence, Governance & Risk, Reports & Predictions
Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if”...
by Mery Zadeh | Dec 17, 2025 | Artificial Intelligence, Leadership, Security Operations
Introduction There’s this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any...
by Vanta | Dec 16, 2025 | Banking & Finance, Compliance & Legal, Leadership
Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for...
by Chaahat Baghla | Dec 15, 2025 | Leadership, Learning & Education, Work & Careers
Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career...
by Chaahat Baghla | Dec 15, 2025 | Artificial Intelligence, Security Operations
Introduction Kaseya Connect APAC 2025 delivered a message that went beyond product releases: MSP cybersecurity is entering an era where resilience, automation and identity-level defences matter more than point solutions. While most coverage will focus on the Datto...
by John de Boer | Dec 15, 2025 | Government & Policy, North America, Physical Security, Secure Communications, Threat Intelligence
Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel...
by Pouya Ghotbi | Dec 12, 2025 | Compliance & Legal, Government & Policy, Identity & Access Management, Personal Security
Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates...
by Vanta | Dec 9, 2025 | Compliance & Legal, Leadership, Security Operations, SMB
Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained...
by Jeffrey Kok | Dec 9, 2025 | Artificial Intelligence, Identity & Access Management, Reports & Predictions
Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility...
by David Caspari | Dec 9, 2025 | Artificial Intelligence, Network Security, Security Operations
Introduction The digital landscape is undergoing a radical transformation, driven by the rapid adoption of cloud services, the proliferation of remote work, and the emergence of sophisticated, AI-powered threats. This hyperconnected world presents unprecedented cyber...
by Rahul Tabeck | Dec 8, 2025 | Cyber Resilience, Leadership, Security Operations
Introduction How confident are you that your operations are resilient enough to tackle today’s challenges while preparing for tomorrow’s? If your answer is ‘very confident’, you’re not alone. According to SolarWinds’ 2025 IT Trends Report, over 90% of IT...
by Greg Zelo | Dec 8, 2025 | Critical Infrastructure, OT Security, Security Operations, Supply Chain
Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or...
by Reuben Koh | Dec 5, 2025 | ANZ, Application Security, Artificial Intelligence, SMB, Threat Intelligence
AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment. Here are the top...
by James Gollan | Dec 5, 2025 | Data Management, Personal Security, Security Awareness, Security Operations, Threat Intelligence
Introduction Australia is fast becoming a hotspot for AI-generated cybercrime. Risks that were once theoretical are now costing businesses millions, even as security teams deploy advanced analytics, AI, and new approaches to keep pace. Consider this case in 2024. A...
by Reuben Koh | Dec 4, 2025 | Cyber Resilience, Personal Security, Security Awareness, SMB
This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities. The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides...
by Bob Huber | Dec 2, 2025 | Artificial Intelligence, Security Awareness, Security Operations, Threat Intelligence
Introduction As Australian organisations race to embed AI tools across human resources, finance and operations, they may be missing a critical security fault line. While disgruntled employees or contractors gone rogue remain a concern, the next major data breach is...
by Chris Rule | Dec 2, 2025 | Critical Infrastructure, Government & Policy
Australia’s critical infrastructure is now on the front line of a contest that is playing out both in cyberspace and our surrounding seas and skies. The choices industry makes in the next few years will determine whether we remain merely connected or truly resilient....
by Cam Perry | Nov 27, 2025 | Artificial Intelligence, Identity & Access Management, Product Development, Reports & Predictions
Insights from the Cisco Live! “Redefining Security in the AI Era” Panel The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of cybersecurity. At the recent “Redefining Security in the AI Era” panel...
by Vanta | Nov 25, 2025 | Compliance & Legal, Governance & Risk, Leadership, Risk Management, Security Operations
Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning...
by Martin Zugec | Nov 25, 2025 | Banking & Finance, East Asia and Pacific, Threat Intelligence
When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations....
by Peter Philipp | Nov 24, 2025 | Banking & Finance, Innovation
Australia’s financial institutions are confronting a new generation of cyber and fraud threats that are testing the limits of traditional defences. From quote manipulation in insurance to networks of co-ordinated money mules and ghost brokering, the old playbook built...
by Cam Perry | Nov 20, 2025 | Artificial Intelligence, Exposure Management, Governance & Risk, Leadership
Artificial Intelligence (AI) continues to redefine technology’s place in organisations, promising unmatched opportunities, alongside uncertainty and risk. At Cisco Live! 2025, the launch of a new report, “Turning Hesitation into Action: How Risk Leaders Can Unlock...
by Agnidipta Sarkar | Nov 19, 2025 | Identity & Access Management, Microsegmentation, Network Security, Offensive Security
Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major corporations. Anthropic, the...
by Matthew Lowe | Nov 19, 2025 | Artificial Intelligence
As cyberattacks grow in scale, speed and sophistication, so too do the costs of defending against them. Global spending on cybersecurity is expected to surge again in the coming year, yet many organisations are finding that more money doesn’t necessarily mean more...
by Scott Hesford | Nov 18, 2025 | Identity & Access Management, Security Operations
Operational discipline is needed to overcome one of the most commonly exploited aspects of technology systems. Against a backdrop of simplification, Australian organisations are on journeys to clean up their existing environments and reduce technical debt. Yet, many...
by M.K. Palmore | Nov 17, 2025 | Leadership
We live in times like we are always on the edge of a crisis. Whether it is due to public health issues, geopolitical instability, economic volatility, or an increase in sophisticated cyber threats, uncertainty has become our constant companion. Effective leadership in...
by MJ Robotham | Nov 17, 2025 | Leadership, Security Awareness, SMB
Cybersecurity remains a pressing concern for businesses across Australia, with the frequency and impact of attacks continuing to rise. While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still...
by Zak Menegazzi | Nov 11, 2025 | ANZ, Cyber Resilience, National Security
As we look ahead to 2026, the cyber landscape confronting Australia is more volatile than ever, and the implications for government, critical infrastructure, and enterprise are profound. Every connected device, every credential, every unpatched system is now potential...
by Dr. Carl Windsor | Nov 7, 2025 | Artificial Intelligence, Critical Infrastructure, Leadership, Reports & Predictions, Security Awareness, Security Operations
Artificial Intelligence (AI): Driving Innovation, But At What Cost? AI is fundamentally transforming almost every business, not just by automating tasks, but by changing how decisions are made, how value is created, and how companies compete. It appears that...
by Nam Lam | Nov 5, 2025 | Identity & Access Management, Leadership, Security Awareness
As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains...
by Bitdefender | Nov 5, 2025 | Reports & Predictions, Security Operations, Threat Intelligence
Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and...
by Bob Huber | Nov 4, 2025 | Compliance & Legal, Crisis Management, Cyber Resilience, Executive Communication, Leadership
For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law. A...
by William Glasson | Nov 3, 2025 | Leadership, Physical Security, Security Operations
Choosing fit-for-purpose infrastructure that will keep your employees, assets and information safe is vital. Introduction Is a security uplift on your agenda during the next 12 months? For many Australian organisations, the answer is yes. While in 2025, our country...
by Rajesh Ganesan | Oct 27, 2025 | Artificial Intelligence, Identity & Access Management, Security Operations
Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, with individuals using it to help them with everyday tasks, boardrooms discussing how best to implement it in their business, and more. However,...