by Agnidipta Sarkar | Dec 22, 2025 | Microsegmentation, Reports & Predictions, Security Operations, Zero Trust
As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For...
by Vanta | Dec 19, 2025 | Compliance & Legal, Executive Communication, Risk Management
Introduction For today’s Chief Information Security Officers (CISOs), compliance is no longer a once-a-year headache, it’s a continuous, evolving mandate. As threat landscapes shift and regulatory frameworks grow more complex, businesses are being called to do more...
by Sumir Bhatia | Dec 18, 2025 | Artificial Intelligence, Governance & Risk, Reports & Predictions
Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if”...
by Mery Zadeh | Dec 17, 2025 | Artificial Intelligence, Leadership, Security Operations
Introduction There’s this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any...
by Vanta | Dec 16, 2025 | Banking & Finance, Compliance & Legal, Leadership
Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for...
by Chaahat Baghla | Dec 15, 2025 | Leadership, Learning & Education, Work & Careers
Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career...
by John de Boer | Dec 15, 2025 | Government & Policy, North America, Physical Security, Secure Communications, Threat Intelligence
Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel...
by Pouya Ghotbi | Dec 12, 2025 | Compliance & Legal, Government & Policy, Identity & Access Management, Personal Security
Introduction Australia’s growing epidemic of identity crime has exposed a critical flaw in the nation’s cyber security response: the victims of data breaches are too often left to clean up the mess alone. As cyberattacks rise and personal information circulates...
by Vanta | Dec 9, 2025 | Compliance & Legal, Leadership, Security Operations, SMB
Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained...
by Jeffrey Kok | Dec 9, 2025 | Artificial Intelligence, Identity & Access Management, Reports & Predictions
Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility...
by David Caspari | Dec 9, 2025 | Artificial Intelligence, Network Security, Security Operations
Introduction The digital landscape is undergoing a radical transformation, driven by the rapid adoption of cloud services, the proliferation of remote work, and the emergence of sophisticated, AI-powered threats. This hyperconnected world presents unprecedented cyber...
by Rahul Tabeck | Dec 8, 2025 | Cyber Resilience, Leadership, Security Operations
Introduction How confident are you that your operations are resilient enough to tackle today’s challenges while preparing for tomorrow’s? If your answer is ‘very confident’, you’re not alone. According to SolarWinds’ 2025 IT Trends Report, over 90% of IT...
by Greg Zelo | Dec 8, 2025 | Critical Infrastructure, OT Security, Security Operations, Supply Chain
Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or...
by Reuben Koh | Dec 5, 2025 | ANZ, Application Security, Artificial Intelligence, SMB, Threat Intelligence
AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment. Here are the top...
by James Gollan | Dec 5, 2025 | Data Management, Personal Security, Security Awareness, Security Operations, Threat Intelligence
Introduction Australia is fast becoming a hotspot for AI-generated cybercrime. Risks that were once theoretical are now costing businesses millions, even as security teams deploy advanced analytics, AI, and new approaches to keep pace. Consider this case in 2024. A...
by Reuben Koh | Dec 4, 2025 | Cyber Resilience, Personal Security, Security Awareness, SMB
This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities. The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides...
by Bob Huber | Dec 2, 2025 | Artificial Intelligence, Security Awareness, Security Operations, Threat Intelligence
Introduction As Australian organisations race to embed AI tools across human resources, finance and operations, they may be missing a critical security fault line. While disgruntled employees or contractors gone rogue remain a concern, the next major data breach is...
by Chris Rule | Dec 2, 2025 | Critical Infrastructure, Government & Policy
Australia’s critical infrastructure is now on the front line of a contest that is playing out both in cyberspace and our surrounding seas and skies. The choices industry makes in the next few years will determine whether we remain merely connected or truly resilient....
by Cam Perry | Nov 27, 2025 | Artificial Intelligence, Identity & Access Management, Product Development, Reports & Predictions
Insights from the Cisco Live! “Redefining Security in the AI Era” Panel The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of cybersecurity. At the recent “Redefining Security in the AI Era” panel...
by Vanta | Nov 25, 2025 | Compliance & Legal, Governance & Risk, Leadership, Risk Management, Security Operations
Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning...
by Martin Zugec | Nov 25, 2025 | Banking & Finance, East Asia and Pacific, Threat Intelligence
When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations....
by Peter Philipp | Nov 24, 2025 | Banking & Finance, Innovation
Australia’s financial institutions are confronting a new generation of cyber and fraud threats that are testing the limits of traditional defences. From quote manipulation in insurance to networks of co-ordinated money mules and ghost brokering, the old playbook built...
by Cam Perry | Nov 20, 2025 | Artificial Intelligence, Exposure Management, Governance & Risk, Leadership
Artificial Intelligence (AI) continues to redefine technology’s place in organisations, promising unmatched opportunities, alongside uncertainty and risk. At Cisco Live! 2025, the launch of a new report, “Turning Hesitation into Action: How Risk Leaders Can Unlock...
by Agnidipta Sarkar | Nov 19, 2025 | Identity & Access Management, Microsegmentation, Network Security, Offensive Security
Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major corporations. Anthropic, the...
by Matthew Lowe | Nov 19, 2025 | Artificial Intelligence
As cyberattacks grow in scale, speed and sophistication, so too do the costs of defending against them. Global spending on cybersecurity is expected to surge again in the coming year, yet many organisations are finding that more money doesn’t necessarily mean more...
by Scott Hesford | Nov 18, 2025 | Identity & Access Management, Security Operations
Operational discipline is needed to overcome one of the most commonly exploited aspects of technology systems. Against a backdrop of simplification, Australian organisations are on journeys to clean up their existing environments and reduce technical debt. Yet, many...
by M.K. Palmore | Nov 17, 2025 | Leadership
We live in times like we are always on the edge of a crisis. Whether it is due to public health issues, geopolitical instability, economic volatility, or an increase in sophisticated cyber threats, uncertainty has become our constant companion. Effective leadership in...
by MJ Robotham | Nov 17, 2025 | Leadership, Security Awareness, SMB
Cybersecurity remains a pressing concern for businesses across Australia, with the frequency and impact of attacks continuing to rise. While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still...
by Zak Menegazzi | Nov 11, 2025 | ANZ, Cyber Resilience, National Security
As we look ahead to 2026, the cyber landscape confronting Australia is more volatile than ever, and the implications for government, critical infrastructure, and enterprise are profound. Every connected device, every credential, every unpatched system is now potential...
by Dr. Carl Windsor | Nov 7, 2025 | Artificial Intelligence, Critical Infrastructure, Leadership, Reports & Predictions, Security Awareness, Security Operations
Artificial Intelligence (AI): Driving Innovation, But At What Cost? AI is fundamentally transforming almost every business, not just by automating tasks, but by changing how decisions are made, how value is created, and how companies compete. It appears that...
by Nam Lam | Nov 5, 2025 | Identity & Access Management, Leadership, Security Awareness
As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains...
by Bitdefender | Nov 5, 2025 | Reports & Predictions, Security Operations, Threat Intelligence
Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and...
by Bob Huber | Nov 4, 2025 | Compliance & Legal, Crisis Management, Cyber Resilience, Executive Communication, Leadership
For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law. A...
by William Glasson | Nov 3, 2025 | Leadership, Physical Security, Security Operations
Choosing fit-for-purpose infrastructure that will keep your employees, assets and information safe is vital. Introduction Is a security uplift on your agenda during the next 12 months? For many Australian organisations, the answer is yes. While in 2025, our country...
by Rajesh Ganesan | Oct 27, 2025 | Artificial Intelligence, Identity & Access Management, Security Operations
Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, with individuals using it to help them with everyday tasks, boardrooms discussing how best to implement it in their business, and more. However,...
by Craig Searle | Oct 22, 2025 | Crypto, Blockchain, and Quantum, Security Awareness, Security Operations, Threat Intelligence
Introduction Cybercrime has matured into a highly structured global economy, rivalling legitimate industries in sophistication and profitability. The World Economic Forum projects that cybercrime will cost the global economy $10.5 trillion in 2025, effectively making...
by Chirag Joshi | Oct 15, 2025 | Artificial Intelligence, Governance & Risk
AI is no longer a future concept. It is already reshaping how we work, how decisions are made, and how organisations operate. The pace of adoption is relentless. In many organisations, AI is embedded into workflows even when no formal policy or governance exists. This...
by Ankur Jain | Oct 15, 2025 | ANZ, Artificial Intelligence, Government & Policy
Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of...
by Gareth Russell | Oct 15, 2025 | Cyber Resilience, Encryption & Cipher, Government & Policy
Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like...
by ColorTokens | Oct 10, 2025 | Microsegmentation, Security Awareness, Security Operations, Threat Intelligence
“Please wait, your document is loading.” That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant...
by Matias Madou | Oct 10, 2025 | Application Security, Artificial Intelligence
Introduction Constantly on the hunt to find new ways to disrupt IT infrastructures, cybercriminals are increasingly shifting their attention from penetrating networks to exploiting software vulnerabilities. While this trend has been evident for some time, it is...
by Harry Chichadjian | Oct 10, 2025 | ANZ, Artificial Intelligence, Cyber Resilience
Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption,...
by Scott Hesford | Oct 8, 2025 | Identity & Access Management
Introduction Identity is now one of the most critical risk exposure points for organisations – frequently targeted and exploited by attackers to gain footholds, escalate privileged access, and move laterally within environments. A recent study found that 90% of...
by Jeremy Thomas | Oct 6, 2025 | Artificial Intelligence, Banking & Finance, Personal Security, Security Awareness, Social Engineering
Embedding fraud intelligence into the digital banking experience will enable you to protect your customers more effectively. Introduction Are you confident your institution is doing all that it can to stop bad actors separating customers from their hard-earned funds?...
by Louis Eichenbaum | Oct 3, 2025 | Government & Policy, Microsegmentation, Security Operations, Zero Trust
Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal...
by Pamela Hornilla | Oct 3, 2025 | Artificial Intelligence, Executive Communication, Leadership, Work & Careers
Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new...
by Mandy Andress | Oct 3, 2025 | Artificial Intelligence, Leadership, Security Operations
Introduction Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, voice, and video at scale, increasing impersonation scams and malware campaigns. In response...
by Gareth Cox | Oct 2, 2025 | Compliance & Legal, Cyber Resilience, Security Operations, Supply Chain
Introduction Australia’s cybersecurity landscape is evolving at a pace that few businesses and public-sector organisations can comfortably manage. It’s a situation marked by three interconnected challenges: a rapidly expanding attack surface, the weaponisation of...