by Sam Salehi | May 7, 2025 | Risk Management
This Global Cybersecurity Week is a timely reminder that cyber risk is no longer a technical issue – it’s a business imperative. As threat actors move faster and AI amplifies the speed and precision of attacks, organisations must evolve how they manage and reduce...
by Olly Stimpson | May 5, 2025 | Security Awareness
As the boundaries between our personal and professional lives continue to blur, World Password Day is a timely reminder that this convergence extends to how we manage passwords. The human element remains a well-known challenge for security and identity professionals....
by Bitdefender | May 1, 2025 | Personal Security, Security Awareness, Threat Intelligence
Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken...
by Dr. Renee Burton | Apr 29, 2025 | ANZ
A $ 945 million – that is how much money Australian consumers reported losing to investment scams in 2024. Often victims are only trying to create financial security and build a failsafe for the future. Instead, they are manipulated, defrauded, and left more...
by Matias Madou | Apr 22, 2025 | Application Security, Cyber Resilience, Security Operations
Introduction With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices. Essentially,...
by Scott Ellis | Apr 22, 2025 | Application Security, Banking & Finance, Network Security
As digital banking, fintech innovations, and mobile transactions continue to reshape the global financial landscape, cybersecurity threats have become increasingly sophisticated. The financial sector, being the backbone of the global economy, is a prime target for...
by Sanket Sharma | Apr 17, 2025 | Crisis Management, Data Management, Digital Forensics
Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured...
by Andy Milburn | Apr 16, 2025 | Compliance & Legal, Crisis Management, Data Management, Risk Management, Security Operations
In today’s digital-first economy, data can be both a powerful asset and a significant liability. Companies that proactively manage their data can achieve multiple positive business outcomes such as making optimal use of their storage infrastructure while...
by Ionut Baltariu | Apr 10, 2025 | Personal Security, Reports & Predictions, Security Awareness, Threat Intelligence
In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns....
by James Tennant | Apr 9, 2025 | Banking & Finance, Leadership
Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical...
by Jason Baden | Apr 9, 2025 | Cloud Security, Leadership, Security Awareness
Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach...
by Scott Magill | Apr 8, 2025 | Cloud Security
Overview The cloud security landscape is facing a seismic shift. With Google’s recent acquisition of Wiz, one of the industry’s most prominent cloud security providers, many in the industry are considering the implications of cloud providers also serving as vendors....
by Matias Madou | Apr 4, 2025 | Cyber Resilience
Governments worldwide, from the UK to Australia, have set ambitious goals to enhance software security by 2030, particularly within critical infrastructure. However, achieving a secure-by-design (SBD) approach is not merely a matter of deploying advanced security...
by Karissa Breen | Mar 31, 2025 | Artificial Intelligence, Digital Forensics, Physical Security, Security Operations
Introduction The Australian Federal Police (AFP) shared at the Microsoft AI Tour 2024, how artificial intelligence (AI) is remoulding crime prevention, particularly in handling large amounts of data and countering cyber threats. Ben Lamont, Chief Data Officer at AFP,...
by David Wiseman | Mar 31, 2025 | Government & Policy, Secure Communications
The Eroding Trust in Consumer Messaging Apps Consumer-grade messaging apps like Signal, WhatsApp and Telegram offer basic end-to-end encryption, effectively securing the content of messages. However, encryption alone is just one piece of a much larger secure...
by Bitdefender | Mar 27, 2025 | Reports & Predictions, Security Operations, Threat Intelligence
Introduction This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on...
by Scott Hesford | Mar 27, 2025 | Identity & Access Management, Security Operations
Introduction Cybersecurity is commonly considered to involve users or people as a key part of the problem, and more than that, it’s an ‘everyone’ problem. Everyone has both a stake and role to play in securing an organisation, having mindset and awareness, and...
by Richard Seiersen | Mar 27, 2025 | Artificial Intelligence, Innovation
The increasing use of AI in both defensive and offensive cyber strategies is prompting enterprises to explore new security solutions. However, as the French writer Alphonse Karr once said, “The more things change, the more they stay the same.” The core question for...
by Peter Philipp | Mar 24, 2025 | Government & Policy, Personal Security, Security Awareness
Introduction Australia’s parliamentary elections are coming under increasing pressure due to the increasing amount of misinformation and disinformation being shared on social media platforms. People share content that is intentionally misleading or not based in fact....
by Karissa Breen | Mar 24, 2025 | Application Security, Artificial Intelligence, Risk Management, Security Operations
Overview Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) – their strategic approach to addressing emerging cyber threats and managing...
by Sam Mackenzie | Mar 20, 2025 | Critical Infrastructure, Leadership, Reports & Predictions
Why Cyber-Physical Security Must Be a Leadership Priority Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security...
by Karissa Breen | Mar 19, 2025 | Artificial Intelligence, Governance & Risk, Security Operations
Securing AI isn’t just about defending against cyber threats – it’s about establishing governance frameworks that ensure AI is used responsibly. With AI adoption accelerating, organisations are needing to align leadership, compliance teams, and IT security to...
by Satyen Desai | Mar 19, 2025 | Leadership, Microsegmentation, Security Operations, Zero Trust
Introduction For years, organizations have invested heavily in firewalls, perimeter sensors, and intrusion detection to keep attackers at bay. But as we continue to see each day, adversaries always manage to slip past these defenses. And the problem doesn’t lie in the...
by Gareth Cox | Mar 17, 2025 | Artificial Intelligence, Innovation, Leadership
Introduction As generative artificial intelligence (GenAI) continues to evolve at lightning speed, usage by businesses will become increasingly widespread. Its uses will include automating customer service through chatbots, generating marketing content, and analysing...
by Kerrick Lehman | Mar 11, 2025 | Artificial Intelligence, Reports & Predictions
Introduction With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Across APAC use cases for...
by Ruma Balasubramanian | Mar 11, 2025 | IWD, Leadership, Work & Careers
On the occasion of International Women’s Day 2025, Ruma Balasubramanian, President Asia Pacific and Japan, Check Point Software Technologies, discusses her thoughts on workplace diversity and its impact on making an enterprise the best place it can be. Your journey...
by Scott McKinnel | Mar 11, 2025 | Compliance & Legal, Cyber Resilience, Exposure Management
Introduction Australia’s healthcare sector is failing at cybersecurity. The latest MediSecure breach, compromising the data of 12.9 million Australians, isn’t an isolated incident—it’s a symptom of a much larger, systemic problem. The industry’s outdated,...
by Pieter Danhieux | Mar 11, 2025 | ANZ, Compliance & Legal, Leadership
Introduction A success marker in cybersecurity has traditionally been for an organisation to have an uneventful year – but this has become much harder to pull off. Even if an organisation manages to navigate the threat landscape without incident, it must still...
by Robert Pizzari | Mar 3, 2025 | Cyber Resilience, Leadership
Introduction Cyber incidents are no longer distant threats, and the scale of challenge is clear – 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at...
by John Harding | Feb 27, 2025 | Data Management
Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation...
by Devasmita Das | Feb 19, 2025 | Cyber Resilience, IoT & Robotics, Microsegmentation, Network Security, Security Operations
Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a larger network breach. These are not hypothetical situations; they...
by ColorTokens | Feb 18, 2025 | Microsegmentation, Security Operations, Threat Intelligence
What’s changed about microsegmentation in 2025? Why does it feel like there’s suddenly a renewed spotlight on this approach? Short answer: because the stakes are higher than ever. It’s no longer just a “nice-to-have” method of tightening your network boundaries. For...
by The Production Team | Feb 17, 2025 | Leadership, Reports & Predictions, Security Operations, Threat Intelligence
Watch The Interview Biography Bret Arsenault is Microsoft’s Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies,...
by Matthew Hanmer | Feb 17, 2025 | National Security, Security Operations, Threat Intelligence
Introduction In November 2024, DDoS attackers launched a campaign targeting Australian websites. It’s not out of the ordinary for Australian sites to be on the receiving end of DDoS attacks. However, this event was unusual, amounting to a surge of over 60 DDoS attacks...
by The Production Team | Feb 14, 2025 | Artificial Intelligence, Governance & Risk, Physical Security, Security Operations
Watch The Interview Biography Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben...
by Jason Whyte | Feb 14, 2025 | Cyber Resilience, Leadership, Security Operations
Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their...
by Bruce Bennie | Feb 14, 2025 | Innovation, Leadership, Security Operations, Telco
The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing...
by The Production Team | Feb 13, 2025 | AUKUS, Leadership, Product Development, Security Operations
Watch The Interview Biography Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team...
by The Production Team | Feb 12, 2025 | Leadership, Work & Careers
Watch The Interview Biography Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and...
by Sam Mackenzie | Feb 12, 2025 | Continuous Business, Critical Infrastructure, Leadership, Security Operations
If you’ve been leading critical infrastructure for a while, you’re no stranger to control rooms. You’ve seen your fair share—some meticulously designed for efficiency, others falling short of expectations. You know the ones: cramped spaces with lighting that’s either...
by Parimal Pandya | Feb 12, 2025 | ANZ, East Asia and Pacific, Reports & Predictions, Security Operations
Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet...
by The Production Team | Feb 11, 2025 | Application Security, Innovation, Leadership, Product Development
Watch The Interview Biography As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about...
by Philip Keogan | Feb 11, 2025 | Sustainability
You can’t manage what you don’t measure. So measure we must. This year we see the continued roll out of the Australian Sustainability Reporting Standards (ASRS) and edge even closer to Australia’s 2030 commitment to Net Zero Emissions. It all points to a need for...
by The Production Team | Feb 10, 2025 | Identity & Access Management, Leadership
Watch The Interview Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last...
by Jamie O'Reilly | Feb 10, 2025 | Governance & Risk, Innovation, Reports & Predictions, Security Operations
Background Penetration test reports are one of the most critical security deliverables for organisations, yet the way they are produced and handled has barely changed in decades. Security teams still receive findings in inconsistent, manually formatted reports, often...
by Agnidipta Sarkar | Feb 7, 2025 | Cyber Resilience, Microsegmentation
Introduction Ransomware attacks have continued to progress throughout this year. Groups such as AlphV, LockBit, Hive, and BlackCat are employing advanced tactics to infiltrate systems and conduct lateral movements within networks. The RansomHub attack on Halliburton,...
by Jeremy Thomas | Feb 7, 2025 | Banking & Finance
Australia’s banking sector is dedicated to protecting its customers from sophisticated criminal networks through the Scam-Safe Accord—a globally leading initiative designed to disrupt, detect, and respond to scam activity. This industry-wide commitment unites...
by Deepak Ajmani | Feb 4, 2025 | Artificial Intelligence, Data Management, Governance & Risk, Security Operations
Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in...