by Jarrod Lucia | Sep 4, 2025 | Application Security, Artificial Intelligence, Offensive Security
Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a...
by Rick Vanover | Sep 4, 2025 | Cyber Resilience, Leadership, Security Operations
Introduction In today’s hyper-connected business environment, where AI-driven systems, multi-cloud strategies, and edge computing dominate conversations, it’s tempting to chase every emerging risk with equal urgency. But when it comes to resilience, success doesn’t...
by Bob Huber | Sep 4, 2025 | Application Security, Artificial Intelligence, Leadership, Security Operations
Introduction Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow...
by Sumir Bhatia | Sep 1, 2025 | ANZ, Government & Policy, Leadership, Security Awareness, SMB
Introduction Scam tactics are growing in scale and sophistication, and so must our collective vigilance. Australians reported over $119 million in scam-related losses in the first four months of 2025. If we are to take anything from this Scam Awareness Week, it’s that...
by Paul Davis | Aug 26, 2025 | Application Security, Compliance & Legal, Governance & Risk
Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security...
by The Production Team | Aug 26, 2025 | Artificial Intelligence, Leadership, Work & Careers
Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the...
by Reuben Koh | Aug 25, 2025 | Leadership, Reports & Predictions, Security Awareness, Security Operations, SMB
Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s...
by Noam Moshe | Aug 21, 2025 | Offensive Security, Physical Security, Security Operations, Threat Intelligence
Executive Summary Team82 has disclosed four vulnerabilities in Axis Communications’ popular line of video surveillance products. Axis published an urgent advisory. The vulnerabilities could expose thousands of organisations to attack. Team82 developed an exploit chain...
by Michael Fisher | Aug 15, 2025 | Application Security
Introduction Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a...
by Morey Haber | Aug 15, 2025 | Identity & Access Management, Security Operations
Modern enterprise IT environments have grown increasingly complex, comprising sprawling networks of users, devices, servers, and cloud services. With this growth comes a pressing vulnerability in the rise of hidden identity risks that threaten to undermine even the...
by Vikas Tatwani | Aug 13, 2025 | Artificial Intelligence, Cyber Resilience, Leadership, Security Operations
“…Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 —...
by Matias Madou | Aug 11, 2025 | Application Security, Artificial Intelligence, Governance & Risk
Since OpenAI’s ChatGPT burst onto the tech scene in late 2022, artificial intelligence (AI) tools have rapidly become embedded in the workflows of software developers. Praised for their speed, efficiency, and ability to assist with complex tasks, AI coding assistants...
by Michael Murphy | Jul 31, 2025 | Critical Infrastructure, Cyber Resilience, Security Operations, Threat Intelligence
Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and...
by Simon Laskaj | Jul 31, 2025 | Application Security, Artificial Intelligence, Data Management, Security Operations
Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to...
by Jamie O'Reilly | Jul 30, 2025 | Application Security, Personal Security, Security Operations
When you’re trying to grow the next big mobile app, going viral is one of the key signs of success. But, going app-viral costs more than people first realise. On the surface, that might make sense. More users mean more costs, it’s just part of doing...
by Ankita Dhakar | Jul 29, 2025 | Cyber Resilience, Leadership, Security Awareness
Introduction In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver licences, passport numbers, and financial details. While remediation focused on containment and response, one quiet question lingered for many...
by James Moorhouse | Jul 28, 2025 | Cyber Resilience
Most organisations plan for the future through a best attempt at guessing what’s coming and hoping they’re right. Wargaming flips that—letting you test the future, pressure-test your plans, and uncover what breaks before it breaks you. Once the preserve of military...
by Steve Katanas | Jul 23, 2025 | Cyber Resilience, GENERAL, Physical Security
As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and...
by Faraz Ali | Jul 23, 2025 | Critical Infrastructure, Cyber Resilience, TECHNOLOGY
As AI continues to drive digital transformation around the world, data centres are taking on a new role. They’re no longer just back-end infrastructure – they’re fast becoming prime targets in a shifting cybersecurity landscape. With the rapid rise of AI,...
by Jeff Kaplan | Jul 23, 2025 | Cyber Resilience, Identity & Access Management, OT Security, Physical Security
As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded...
by Johan Fantenberg | Jul 23, 2025 | Governance & Risk
In an era where cyber threats loom large over organisations of all sizes, one of the most effective strategies for mitigating internal risks is the principle of Separation of Duties (SoD). Traditionally associated with financial management and compliance, SoD is now...
by Les Williamson | Jul 21, 2025 | Cyber Resilience
In an age where digital infrastructure underpins nearly every facet of corporate operations, operational resilience has become a non-negotiable priority for Australian businesses. Increasingly, the responsibility for embedding this resilience is falling to the Chief...
by Nathan Kerr | Jul 19, 2025 | Announcements, Banking & Finance
Verifying identity during tax time shouldn’t be a hassle. But for many Australians, outdated systems and limited ID options turn a simple process into a frustrating one. That’s why One Click has integrated ConnectID®, a digital identity solution developed by...
by Darrin Iatrou | Jul 16, 2025 | Critical Infrastructure, IoT & Robotics, Security Operations, Zero Trust
Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a...
by Vanta | Jul 15, 2025 | Application Security, Assessment & Audit, Product Development, Risk Management
Introduction In the past, security and revenue were considered two sides of a coin; one a business enabler, the other a compliance necessity. But that mindset is quickly becoming obsolete. The most forward-thinking software companies are now embedding security into...
by Pamela Hornilla | Jul 14, 2025 | Cloud Security, Security Operations
Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT environment from scratch. The pair discussed the tools that work, the ones that don’t, and how decisions should be based on people. The conversation...
by Daniel Sutherland | Jul 10, 2025 | Encryption & Cipher, Network Security, Reports & Predictions, Security Operations
Introduction Cybersecurity, as we know it, could be facing an extinction-level event—one that will reshape and rebuild the entire industry. Innovations like AI are already transforming threat landscapes and defences, while quantum computing looms as a seismic shift...
by Spintel | Jul 10, 2025 | Security Operations, SMB, Telco
Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest...
by Spintel | Jul 8, 2025 | Network Security, SMB, Telco
Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone...
by Agnidipta Sarkar | Jul 7, 2025 | Cyber Resilience, Security Operations, Threat Intelligence, Zero Trust
Introduction On July 2, 2025, Qantas, Australia’s flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in...
by Spintel | Jul 3, 2025 | Security Operations, SMB, Telco
Introduction Setting up internet for your business is not a one size fits all exercise. Whether you’re running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact...
by Grant Geyer | Jul 3, 2025 | Critical Infrastructure, Investment, Leadership, Security Operations, Threat Intelligence
Overview This wasn’t a super sophisticated cyber attack; it was someone logging into a control system with too little security and opening a dam valve all the way. While the impact was minimal – 447 litres/second of flooding – it’s a reminder that the same...
by John Harding | Jul 3, 2025 | ANZ, Data Management, Governance & Risk, Security Operations
Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it...
by John Deeb | Jul 2, 2025 | Artificial Intelligence, Innovation, Investment, Leadership, Security Operations
Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. It is estimated that 1.3 million technology workers will be needed in Australia...
by Matt Miller | Jul 2, 2025 | Identity & Access Management, Security Awareness, Zero Trust
Introduction We live in an era where our digital identity is just as valuable — if not more so — than our physical presence. From the moment we sign up for a new service, subscribe to a newsletter, or tap “accept” on a cookie policy, we begin to create a data...
by Vanta | Jun 30, 2025 | Assessment & Audit, Security Operations, Supply Chain
Introduction As organisations continue to rely heavily on Software-as-a-Service (SaaS) tools and cloud-based vendors, the need to proactively manage third-party risk is more critical than ever. With over 60% of data breaches originating from third parties and the...
by Pamela Hornilla | Jun 30, 2025 | Risk Management
Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps...
by Pamela Hornilla | Jun 30, 2025 | Artificial Intelligence, Cloud Security
In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite....
by Reuben Koh | Jun 29, 2025 | Crisis Management, Executive Communication, Exposure Management, Security Operations
Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals...
by Pamela Hornilla | Jun 27, 2025 | Artificial Intelligence, Crisis Management, News and Updates
In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and...
by Ivano Bongiovanni | Jun 26, 2025 | ANZ, Critical Infrastructure, Cyber Resilience, Investment, Network Security, Security Operations, Threat Intelligence
Introduction Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response. ...
by Asadullah Rathore | Jun 24, 2025 | Artificial Intelligence, BUSINESS
Asadullah (Asad) Rathore, Head of Professional Services – cyber security and AI consulting, Excite Cyber (ASX:EXT) As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber...
by Ankur Jain | Jun 24, 2025 | Artificial Intelligence
GenAI, automation and Machine Learning (ML) are driving generational change – reshaping the future of business and society as we know it. However, for these capabilities to accelerate innovation at an organisational level, Australian enterprises must overcome a...
by Johan Fantenberg | Jun 23, 2025 | Supply Chain
In the modern global economy, supply chains are no longer just physical networks but have become vast digital ecosystems. At the heart of these systems lies a challenge that is rapidly gaining prominence among cybersecurity professionals: third-party digital access....
by Christopher Hills | Jun 23, 2025 | Identity & Access Management
In an era where cyberattacks are growing in scale and sophistication, digital identities have emerged as the new battleground. Once the exclusive domain of Identity and Access Management (IAM) teams, identity security is now a core cybersecurity and business...
by Jay S. Goodman | Jun 20, 2025 | Leadership, Secure Communications, Security Operations
Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and...
by Zak Menegazzi | Jun 18, 2025 | Exposure Management
With the new financial year approaching, Australian organisations face a pressing imperative to strengthen their cyber defences and heighten their vigilance against cyberwarfare. Modern cyberwarfare is marked by a surge in state-sponsored attacks, the weaponisation of...
by Matias Madou | Jun 18, 2025 | Artificial Intelligence
The rapid adoption of artificial intelligence (AI) coding assistants has transformed software development, offering much-needed relief for developers grappling with growing workloads and tight delivery timelines. These generative AI tools have been widely embraced for...