“While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability toย employ new, sophisticated tactics on consumers. One emerging trend we’re seeing is the use of AI-powered tools, with...
In an era where quantum computing edges closer to practicality, the cryptographic protocols we rely on must evolve to meet emerging challenges. Post-Quantum Cryptography (PQC) represents a proactive step towards safeguarding sensitive information against...
As cybersecurity threats become more sophisticated, businesses find themselves facing attackers who exploit increasingly complex identity trusts. The proliferation of digital transformation, accelerated by cloud adoption and remote work trends, has expanded...
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating...
This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which addresses fundamental issues of randomness,...
Financial institutions are leading the way in their pursuit of adaptive protections against evolving information-stealing threats. Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find...
Introduction Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but...
Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation. The idea of baking security into software right from the start of the development lifecycle is going from strength to strength, having...
Introduction As the quantum computing era approaches, organisations must adopt Post-Quantum Cryptography (PQC) to safeguard their data against future quantum threats. A critical decision in this transition is whether to implement PQC through cloud-based services or...
As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they arenโt the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing...
Introduction Australia has seen an increasing procession of deepfakes causing real-world concern. An Australian man lost $80,000 in cryptocurrency after viewing a deepfake video of a public figure encouraging an investment that was in fact a scam – a common...
There is a rising appetite for SOC modernisation and transformation among Australian companies, driven by a desire to enhance security maturity, improve resilience against cyberattacks, and reduce risk in a digitally-driven world. SOCs today are challenged by a...