by Devasmita Das | Feb 19, 2025 | Cyber Resilience, IoT & Robotics, Microsegmentation, Network Security, Security Operations
Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a larger network breach. These are not hypothetical situations; they...
by ColorTokens | Feb 18, 2025 | Microsegmentation, Security Operations, Threat Intelligence
What’s changed about microsegmentation in 2025? Why does it feel like there’s suddenly a renewed spotlight on this approach? Short answer: because the stakes are higher than ever. It’s no longer just a “nice-to-have” method of tightening your network boundaries. For...
by The Production Team | Feb 17, 2025 | Leadership, Reports & Predictions, Security Operations, Threat Intelligence
Watch The Interview Biography Bret Arsenault is Microsoft’s Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies,...
by Matthew Hanmer | Feb 17, 2025 | National Security, Security Operations, Threat Intelligence
Introduction In November 2024, DDoS attackers launched a campaign targeting Australian websites. It’s not out of the ordinary for Australian sites to be on the receiving end of DDoS attacks. However, this event was unusual, amounting to a surge of over 60 DDoS attacks...
by The Production Team | Feb 14, 2025 | Artificial Intelligence, Governance & Risk, Physical Security, Security Operations
Watch The Interview Biography Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben...
by Jason Whyte | Feb 14, 2025 | Cyber Resilience, Leadership, Security Operations
Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their...
by Bruce Bennie | Feb 14, 2025 | Innovation, Leadership, Security Operations
The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing...
by The Production Team | Feb 13, 2025 | AUKUS, Leadership, Product Development, Security Operations
Watch The Interview Biography Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team...
by The Production Team | Feb 12, 2025 | Leadership, Work & Careers
Watch The Interview Biography Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and...
by Sam Mackenzie | Feb 12, 2025 | Critical Infrastructure, Leadership, Security Operations
If you’ve been leading critical infrastructure for a while, you’re no stranger to control rooms. You’ve seen your fair share—some meticulously designed for efficiency, others falling short of expectations. You know the ones: cramped spaces with lighting that’s either...
by Parimal Pandya | Feb 12, 2025 | ANZ, East Asia and Pacific, Reports & Predictions, Security Operations
Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet...
by The Production Team | Feb 11, 2025 | Application Security, Innovation, Leadership, Product Development
Watch The Interview Biography As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about...
by Philip Keogan | Feb 11, 2025 | Sustainability
You can’t manage what you don’t measure. So measure we must. This year we see the continued roll out of the Australian Sustainability Reporting Standards (ASRS) and edge even closer to Australia’s 2030 commitment to Net Zero Emissions. It all points to a need for...
by The Production Team | Feb 10, 2025 | Identity & Access Management, Leadership
Watch The Interview Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last...
by Jamie O'Reilly | Feb 10, 2025 | Governance & Risk, Innovation, Reports & Predictions, Security Operations
Background Penetration test reports are one of the most critical security deliverables for organisations, yet the way they are produced and handled has barely changed in decades. Security teams still receive findings in inconsistent, manually formatted reports, often...
by Agnidipta Sarkar | Feb 7, 2025 | Cyber Resilience, Microsegmentation
Introduction Ransomware attacks have continued to progress throughout this year. Groups such as AlphV, LockBit, Hive, and BlackCat are employing advanced tactics to infiltrate systems and conduct lateral movements within networks. The RansomHub attack on Halliburton,...
by Jeremy Thomas | Feb 7, 2025 | FinTech
Australia’s banking sector is dedicated to protecting its customers from sophisticated criminal networks through the Scam-Safe Accord—a globally leading initiative designed to disrupt, detect, and respond to scam activity. This industry-wide commitment unites...
by Deepak Ajmani | Feb 4, 2025 | Artificial Intelligence, Data Management, Governance & Risk, Security Operations
Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in...
by Matias Madou | Feb 3, 2025 | Artificial Intelligence
Since the release of ChatGPT in late 2022, artificial intelligence (AI) tools have become widely used by software developers. According to research by the Australian Government’s Department of Industry, Science and Resources[1], 35% of small and mid-sized businesses...
by Wai King Wong | Feb 3, 2025 | Physical Security
As the security sector evolves, the trends and technologies shaping our industry also advance at an unprecedented pace. From hybrid solutions to artificial intelligence (AI) and new ways to use your security hardware, the emerging trends are not just reshaping the...
by Dr. Renee Burton | Jan 31, 2025 | Network Security
In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a...
by Vilas Madan | Jan 31, 2025 | Artificial Intelligence
By Vilas Madan, Senior VP and Growth Leader of APAC, EXL Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more...
by Richard Seiersen | Jan 31, 2025 | AWARDS & RECOGNITION, BUSINESS, IWD, Leadership, Reports & Predictions, SMB, Uncategorized
In today’s digital age, CISOs face increasing pressure to protect their organisations from a barrage of cyber threats. In fact, the latest statistics from the Office of the Australian Information Commissioner (OAIC) show the number of data breaches notified to the...
by Gary Savarino | Jan 28, 2025 | Security Awareness
On Data Privacy Day, I want to emphasise the critical need for organisations to fundamentally shift their approach to cybersecurity as technology and AI continue to evolve. With most cyber incidents originating from compromised credentials, it is clear that...
by Reuben Koh | Jan 28, 2025 | Application Security
Australia’s banking and financial services sector is undergoing a rapid digital transformation amidst a growing consumer appetite for convenient, fast and secure interactions and the emergence of open banking. A report by the Australian Banking Association revealed...
by Christiaan Beek | Jan 28, 2025 | Threat Intelligence
By Christiaan Beek, Rapid7’s Senior Director, Threat Analytics. The ransomware landscape in 2024 continued to evolve at a rapid pace, outgrowing many of the trends we saw in 2023. Threat actors remained relentless and innovative, targeting organisations of all sizes...
by Nadir Izrael | Jan 23, 2025 | Threat Intelligence
We live in uncertain times. When we consider the “known unknowns” – like war, financial crises, and of course, cyber disruptions – as events that we can conceive, the likelihood and severity of them remain shrouded in uncertainty. The realm of cybersecurity, like many...
by Sam Salehi | Jan 23, 2025 | Security Awareness
On Data Privacy Day, we are reminded of the critical importance of safeguarding personal information and empowering organisations to protect their digital assets. In an era where data is a key currency, it’s vital to prioritise transparency, trust, and the responsible...
by The Production Team | Jan 23, 2025 | Security Awareness, SMB, Threat Intelligence
Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly...
by Olly Stimpson | Jan 23, 2025 | Security Awareness
As Data Privacy Day approaches, discussions often lean toward pessimism, with increased cyber threats and exposed data dominating the narrative. However, it’s important to recognise the positive strides made in Australia throughout 2024, building the right foundations...
by Greg Sullivan | Jan 22, 2025 | Cyber Resilience, Reports & Predictions
In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over...
by Liat Hayun | Jan 21, 2025 | Cloud Security
Introduction Cloud environments, while offering unparalleled agility and scalability, are also a major source of risk exposure for organisations worldwide, with breaches ranging from misconfigurations to advanced cyberattacks. According to Tenable’s 2024 Cloud...
by Kash Sharma | Jan 17, 2025 | Security Awareness, Security Operations, Social Engineering, Supply Chain
Introduction Every year, more and more Australian companies are confronted with website and email spoofing worldwide. The recent Annual Cyber Threat Report 2023-2024 revealed that the Australian Signals Directorate’s Domain Takedown Service made more than 189,000...
by Sam Mackenzie | Jan 15, 2025 | Compliance & Legal, Critical Infrastructure, Cyber Resilience, Governance & Risk, OT Security
At the Art of Play with my youngest some time back, I was reminded how covering things up only masks the problem. It got me thinking about the art of mastering cyber risk. Disconnected governance, incomplete controls or sheer technology complexity can mask the risk...
by Pieter Danhieux | Jan 15, 2025 | Innovation
In the ever-changing landscape of cybersecurity, experts are increasingly advocating for Secure-by-Design principles to address the accelerating challenges of today’s digital world. The concept emphasises embedding security into software from the beginning of the...
by Nam Lam | Jan 15, 2025 | Identity & Access Management
Australia is leading the charge in digital payments, with mobile wallet transactions skyrocketing to $126 billion in 2023—a staggering 169-fold increase since 2018, according to the Australian Banking Association (ABA). But as the relentless wave of digitisation...
by Ashwin Ram | Jan 15, 2025 | Cyber Resilience
By Ashwin Ram, Evangelist, Office of the CTO, Check Point Software Technologies Australia & New Zealand The latest report from the Office of the Australian Information Commissioner (OAIC) reveals a troubling trend that boards can no longer afford to ignore: 527...
by Shane Maher | Jan 13, 2025 | Cloud Security
The dominant workplace issue of 2024 was the return to the office with some of the world’s most powerful chief executives shifting millions of workers back into the office. But for chief technology officers, the situation will not get materially simpler. A critical...
by Richard Seiersen | Jan 8, 2025 | Cyber Resilience
1. Prediction: The increasing use of AI will not alter the basics of cybersecurity strategies “While several enterprises are looking for the next best AI solution in an effort to fight fire with fire, I am reminded of the famous Alphonse Karr quote, “The more things...
by Thomas Fikentscher | Jan 8, 2025 | Identity & Access Management
The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity...
by Rajesh Khazanchi | Jan 8, 2025 | Cyber Resilience
Let me start by wishing everyone Happy Holidays and a great new 2025 ahead. As we exit 2024, I am equally hopeful and worried about the year ahead. While I am concerned that even increased spending on cybersecurity has not slowed down cyberattacks, with increased...
by John Penn | Dec 23, 2024 | Security Awareness, Security Operations
Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay...
by Lee Barney | Dec 20, 2024 | Critical Infrastructure, SMB
“While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we’re seeing is the use of AI-powered tools, with...
by Scott Hesford | Dec 16, 2024 | Identity & Access Management
As cybersecurity threats become more sophisticated, businesses find themselves facing attackers who exploit increasingly complex identity trusts. The proliferation of digital transformation, accelerated by cloud adoption and remote work trends, has expanded...
by Robert Haist | Dec 13, 2024 | AWARDS & RECOGNITION, Cyber Resilience, IWD, Leadership, Reports & Predictions, Security Awareness, Security Operations, SMB, Uncategorized
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating...
by Agnidipta Sarkar | Dec 12, 2024 | Cyber Resilience, Microsegmentation, Threat Intelligence
This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which addresses fundamental issues of randomness,...
by Morey Haber | Dec 11, 2024 | FinTech
Financial institutions are leading the way in their pursuit of adaptive protections against evolving information-stealing threats. Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find...
by Simon Berglund | Dec 11, 2024 | Artificial Intelligence, Governance & Risk
Introduction Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but...