by Michael Fisher | Aug 15, 2025 | Application Security
Introduction Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a...
by Morey Haber | Aug 15, 2025 | Identity & Access Management, Security Operations
Modern enterprise IT environments have grown increasingly complex, comprising sprawling networks of users, devices, servers, and cloud services. With this growth comes a pressing vulnerability in the rise of hidden identity risks that threaten to undermine even the...
by Vikas Tatwani | Aug 13, 2025 | Artificial Intelligence, Cyber Resilience, Leadership, Security Operations
“…Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 —...
by Matias Madou | Aug 11, 2025 | Application Security, Artificial Intelligence, Governance & Risk
Since OpenAI’s ChatGPT burst onto the tech scene in late 2022, artificial intelligence (AI) tools have rapidly become embedded in the workflows of software developers. Praised for their speed, efficiency, and ability to assist with complex tasks, AI coding assistants...
by Michael Murphy | Jul 31, 2025 | Critical Infrastructure, Cyber Resilience, Security Operations, Threat Intelligence
Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and...
by Simon Laskaj | Jul 31, 2025 | Application Security, Artificial Intelligence, Data Management, Security Operations
Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to...
by Jamie O'Reilly | Jul 30, 2025 | Application Security, Personal Security, Security Operations
When you’re trying to grow the next big mobile app, going viral is one of the key signs of success. But, going app-viral costs more than people first realise. On the surface, that might make sense. More users mean more costs, it’s just part of doing...
by Ankita Dhakar | Jul 29, 2025 | Cyber Resilience, Leadership, Security Awareness
Introduction In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver licences, passport numbers, and financial details. While remediation focused on containment and response, one quiet question lingered for many...
by James Moorhouse | Jul 28, 2025 | Cyber Resilience
Most organisations plan for the future through a best attempt at guessing what’s coming and hoping they’re right. Wargaming flips that—letting you test the future, pressure-test your plans, and uncover what breaks before it breaks you. Once the preserve of military...
by Steve Katanas | Jul 23, 2025 | Cyber Resilience, GENERAL, Physical Security
As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and...
by Faraz Ali | Jul 23, 2025 | Critical Infrastructure, Cyber Resilience, TECHNOLOGY
As AI continues to drive digital transformation around the world, data centres are taking on a new role. They’re no longer just back-end infrastructure – they’re fast becoming prime targets in a shifting cybersecurity landscape. With the rapid rise of AI,...
by Jeff Kaplan | Jul 23, 2025 | Cyber Resilience, Identity & Access Management, OT Security, Physical Security
As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded...
by Johan Fantenberg | Jul 23, 2025 | Governance & Risk
In an era where cyber threats loom large over organisations of all sizes, one of the most effective strategies for mitigating internal risks is the principle of Separation of Duties (SoD). Traditionally associated with financial management and compliance, SoD is now...
by Les Williamson | Jul 21, 2025 | Cyber Resilience
In an age where digital infrastructure underpins nearly every facet of corporate operations, operational resilience has become a non-negotiable priority for Australian businesses. Increasingly, the responsibility for embedding this resilience is falling to the Chief...
by Nathan Kerr | Jul 19, 2025 | Announcements, Banking & Finance
Verifying identity during tax time shouldn’t be a hassle. But for many Australians, outdated systems and limited ID options turn a simple process into a frustrating one. That’s why One Click has integrated ConnectID®, a digital identity solution developed by...
by Darrin Iatrou | Jul 16, 2025 | Critical Infrastructure, IoT & Robotics, Security Operations, Zero Trust
Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a...
by Vanta | Jul 15, 2025 | Application Security, Assessment & Audit, Product Development, Risk Management
Introduction In the past, security and revenue were considered two sides of a coin; one a business enabler, the other a compliance necessity. But that mindset is quickly becoming obsolete. The most forward-thinking software companies are now embedding security into...
by Pamela Hornilla | Jul 14, 2025 | Cloud Security, Security Operations
Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT environment from scratch. The pair discussed the tools that work, the ones that don’t, and how decisions should be based on people. The conversation...
by Daniel Sutherland | Jul 10, 2025 | Encryption & Cipher, Network Security, Reports & Predictions, Security Operations
Introduction Cybersecurity, as we know it, could be facing an extinction-level event—one that will reshape and rebuild the entire industry. Innovations like AI are already transforming threat landscapes and defences, while quantum computing looms as a seismic shift...
by Spintel | Jul 10, 2025 | Security Operations, SMB, Telco
Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest...
by Spintel | Jul 8, 2025 | Network Security, SMB, Telco
Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone...
by Agnidipta Sarkar | Jul 7, 2025 | Cyber Resilience, Security Operations, Threat Intelligence, Zero Trust
Introduction On July 2, 2025, Qantas, Australia’s flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in...
by Spintel | Jul 3, 2025 | Security Operations, SMB, Telco
Introduction Setting up internet for your business is not a one size fits all exercise. Whether you’re running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact...
by Grant Geyer | Jul 3, 2025 | Critical Infrastructure, Investment, Leadership, Security Operations, Threat Intelligence
Overview This wasn’t a super sophisticated cyber attack; it was someone logging into a control system with too little security and opening a dam valve all the way. While the impact was minimal – 447 litres/second of flooding – it’s a reminder that the same...
by John Harding | Jul 3, 2025 | ANZ, Data Management, Governance & Risk, Security Operations
Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it...
by John Deeb | Jul 2, 2025 | Artificial Intelligence, Innovation, Investment, Leadership, Security Operations
Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. It is estimated that 1.3 million technology workers will be needed in Australia...
by Matt Miller | Jul 2, 2025 | Identity & Access Management, Security Awareness, Zero Trust
Introduction We live in an era where our digital identity is just as valuable — if not more so — than our physical presence. From the moment we sign up for a new service, subscribe to a newsletter, or tap “accept” on a cookie policy, we begin to create a data...
by Vanta | Jun 30, 2025 | Assessment & Audit, Security Operations, Supply Chain
Introduction As organisations continue to rely heavily on Software-as-a-Service (SaaS) tools and cloud-based vendors, the need to proactively manage third-party risk is more critical than ever. With over 60% of data breaches originating from third parties and the...
by Pamela Hornilla | Jun 30, 2025 | Risk Management
Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps...
by Pamela Hornilla | Jun 30, 2025 | Artificial Intelligence, Cloud Security
In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite....
by Reuben Koh | Jun 29, 2025 | Crisis Management, Executive Communication, Exposure Management, Security Operations
Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals...
by Pamela Hornilla | Jun 27, 2025 | Artificial Intelligence, Crisis Management, News and Updates
In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and...
by Ivano Bongiovanni | Jun 26, 2025 | ANZ, Critical Infrastructure, Cyber Resilience, Investment, Network Security, Security Operations, Threat Intelligence
Introduction Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response. ...
by Asadullah Rathore | Jun 24, 2025 | Artificial Intelligence, BUSINESS
Asadullah (Asad) Rathore, Head of Professional Services – cyber security and AI consulting, Excite Cyber (ASX:EXT) As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber...
by Ankur Jain | Jun 24, 2025 | Artificial Intelligence
GenAI, automation and Machine Learning (ML) are driving generational change – reshaping the future of business and society as we know it. However, for these capabilities to accelerate innovation at an organisational level, Australian enterprises must overcome a...
by Johan Fantenberg | Jun 23, 2025 | Supply Chain
In the modern global economy, supply chains are no longer just physical networks but have become vast digital ecosystems. At the heart of these systems lies a challenge that is rapidly gaining prominence among cybersecurity professionals: third-party digital access....
by Christopher Hills | Jun 23, 2025 | Identity & Access Management
In an era where cyberattacks are growing in scale and sophistication, digital identities have emerged as the new battleground. Once the exclusive domain of Identity and Access Management (IAM) teams, identity security is now a core cybersecurity and business...
by Jay S. Goodman | Jun 20, 2025 | Leadership, Secure Communications, Security Operations
Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and...
by Zak Menegazzi | Jun 18, 2025 | Exposure Management
With the new financial year approaching, Australian organisations face a pressing imperative to strengthen their cyber defences and heighten their vigilance against cyberwarfare. Modern cyberwarfare is marked by a surge in state-sponsored attacks, the weaponisation of...
by Matias Madou | Jun 18, 2025 | Artificial Intelligence
The rapid adoption of artificial intelligence (AI) coding assistants has transformed software development, offering much-needed relief for developers grappling with growing workloads and tight delivery timelines. These generative AI tools have been widely embraced for...
by Gareth Cox | Jun 18, 2025 | Exposure Management
In an increasingly digital world, Australian businesses are more vulnerable than ever to one of the most dangerous yet underestimated cybersecurity risks: insider threats. These threats, which originate from within an organisation, pose a unique challenge as they...
by Pamela Hornilla | Jun 17, 2025 | Leadership, Risk Management
In Episode 4 of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed what’s really dragging security down in modern organisations. And spoiler, it’s not the hackers. If you’re someone in tech, security, or just trying to make sense of how to run a...
by Pascal Geenens | Jun 12, 2025 | Artificial Intelligence
The recent release of DeepSeek-R1 by the Chinese startup DeepSeek has garnered a lot of interest and could spark a new wave of innovation, potentially rebalancing the state of AI supremacy between the major competitors on the global stage. By introducing unique...
by Pamela Hornilla | Jun 12, 2025 | Leadership
In Episode 2 of the DevSecOops podcast, hosts Tom Walker, James Vincent, and Scott Fletcher explored one of the biggest yet most overlooked challenges in organisations today: how to make the right decisions, especially when business, technology, and security...
by Jason Merrick | Jun 11, 2025 | Identity & Access Management
The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden...
by Sunny Rao | Jun 6, 2025 | Artificial Intelligence
Software has become the undisputed driver of business today. As the reliance on software has grown, so have the moving parts needed to make it, especially amid the rise of generative artificial intelligence (GenAI). As a result, software development has become a...
by Peter Graves | Jun 5, 2025 | Artificial Intelligence
Australia’s manufacturing sector is integral to the country’s economic framework, employing over 850,000 individuals and contributing approximately 6% to the national GDP.. However, challenges such as supply chain disruptions alongside workforce shortages, escalating...
by Pamela Hornilla | Jun 5, 2025 | Cloud Security, Critical Infrastructure
Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure. With recent news out of the US and...