by Scott Hesford | Apr 17, 2026 | Continuous Business, Identity & Access Management, Leadership, Security Operations
In office buildings around the world, the instruction is clear and universally understood: in case of fire, break glass. The act is deliberate, visible and reserved for emergencies only. In cybersecurity, however, the equivalent mechanism, the so-called “break glass...
by Blackberry | Apr 16, 2026 | Encryption & Cipher, Security Operations, Threat Intelligence
The most dangerous attacks against secure communications don’t decrypt your messages. They compromise the device before encryption occurs — then watch every keystroke, every screen, and every conversation in plaintext. CVE-2026-21385 is the latest documented...
by John Deeb | Apr 16, 2026 | Data Management, Data Security, Governance & Risk, Identity & Access Management
Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with...
by Sean Deuby | Apr 15, 2026 | Identity & Access Management, Security Operations
The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the...
by Blackberry | Apr 13, 2026 | Encryption & Cipher, Executive Communication, Personal Security, Secure Communications
Dutch intelligence has confirmed what enterprise security architects have long understood: consumer-grade messaging apps, regardless of their encryption implementation, are structurally unfit for sensitive government and military communications. The reason is not...
by Peter Cardassis | Apr 13, 2026 | Artificial Intelligence, Government & Policy
Introduction Logicalis Australia is calling for a shift in how Australia approaches artificial intelligence (AI), warning that the country risks missing a major global opportunity if it continues to focus primarily on policy and access to compute rather than...
by David Hope | Apr 8, 2026 | National Security, Network Security, Physical Security, Security Operations
Introduction In Australia, the intensity of our airport and aviation security is strangely famous worldwide. It even has its own reality television show; Border Security – Australia’s Front Line. The scene is always similar: drug sniffing dogs, x-ray machines and...
by Rochelle Cervantes | Apr 3, 2026 | Application Security, Artificial Intelligence, Cloud Security, Cyber Resilience
The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake...
by MJ Robotham | Apr 2, 2026 | Risk Management, Security Operations
Introduction Australian organisations’ technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once...
by Kumar Mitra | Apr 2, 2026 | Artificial Intelligence, Governance & Risk, Leadership
Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear...
by James Greenwood | Apr 2, 2026 | Cyber Resilience, Leadership, Security Operations
Introduction Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of...
by Kavya Shastry | Apr 2, 2026 | Artificial Intelligence, Leadership, Risk Management, Security Operations
Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making...
by Harshvendra Soin | Mar 30, 2026 | Artificial Intelligence, Executive Communication, Governance & Risk
In the Asia, Pacific and Japan (APJ) region, one of the biggest challenges for businesses isn’t technology, it’s communication. The region spans more than 23 major languages, multiple dialects and profoundly different business cultures. Translating messages correctly...
by Christoph Nagy | Mar 18, 2026 | Application Security
Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated,...
by Daniel Sutherland | Mar 17, 2026 | Cyber Resilience, Security Operations
Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public...
by Mathieu Chevalier | Mar 13, 2026 | Identity & Access Management, Physical Security
Access control has long been treated as a function of facilities teams, focused on unlocking and locking doors. As digital systems and physical spaces become more interconnected, that point of view needs to be rethought. Access control is now playing an added role to...
by Lee Shelford | Mar 13, 2026 | Physical Security, Security Operations
In a security operations centre, operators are often asked to review hours of video surveillance footage to understand incidents that lasted only minutes. Investigations typically involve switching between camera views, aligning timelines, and manually scanning...
by Praveena Raman | Mar 10, 2026 | IWD
International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely...
by Ashley Diffey | Mar 9, 2026 | Artificial Intelligence, Identity & Access Management
As artificial intelligence transforms digital commerce and the workplace, it is also dismantling the foundations of online trust. In an environment where deepfakes can mimic executives, synthetic identities can pass background checks, and AI-powered phishing campaigns...
by Louise Humphreys | Mar 6, 2026 | Artificial Intelligence
In this article Owen Lamont from Acadian Asset Management revisits Einstein’s Depression-era warning about “technological unemployment” and argues that the real economic threat may not be AI itself, but the narrative that AI will replace us all. Einstein’s...
by Vikas Tatwani | Mar 5, 2026 | Artificial Intelligence, Security Operations
The digital footprint of Australian organisations is no longer confined to enterprise boundaries: public cloud adoption has risen steadily over the past few years; more than 80 percent of enterprises follow a hybrid work model; and the multi-access edge computing...
by Raymond Schippers | Mar 3, 2026 | Artificial Intelligence, Offensive Security, Security Operations
Introduction Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains...
by Matias Madou | Mar 2, 2026 | Product Development
If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to...
by Christopher Hills | Feb 24, 2026 | Identity & Access Management, Security Operations
For more than a decade, cybersecurity professionals have repeated a now-familiar mantra: identity is the new perimeter. However, in many organisations, identity security remains fragmented, inconsistently governed and poorly understood across increasingly complex...
by Scott Morris | Feb 23, 2026 | Personal Security, Security Awareness, Social Engineering, Threat Intelligence
Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of...
by Joris van de Vis | Feb 18, 2026 | Application Security
Hackers are becoming increasingly sophisticated by the day. Ever-evolving cyber threats are happening at an overwhelming pace. Organizations using SAP systems have become favorite targets for cybercriminals. For SAP users, the necessity for comprehensive cybersecurity...
by Riccardo Di Blasio | Feb 18, 2026 | Artificial Intelligence, Cyber Resilience, Data Management
I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by...
by Vanta | Feb 18, 2026 | Compliance & Legal, Leadership, Security Operations
Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance...
by Gagan Gulati | Feb 16, 2026 | Artificial Intelligence, Cyber Resilience
AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double...
by Cam Perry | Feb 14, 2026 | Artificial Intelligence, Network Security, Product Development
The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has...
by John Kolm | Feb 12, 2026 | Artificial Intelligence, Personal Security
When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the...
by Ritesh Chugh | Feb 12, 2026 | Personal Security, Social Engineering
As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship,...
by Gagan Gulati | Feb 10, 2026 | Crypto, Blockchain, and Quantum, Cyber Resilience, Data Management
The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified...
by David Magee | Feb 10, 2026 | Critical Infrastructure, Leadership, Security Operations
From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have...
by Ben Mudie | Feb 10, 2026 | Application Security, Executive Communication, Leadership, Security Operations
Introduction Boards today have never seen more cyber risk data. Dashboards glow with heat maps, scores, alerts and reassuring trend lines. Cyber is now a standing agenda item, backed by metrics designed to prove the organisation is in control. And yet, beneath this...
by Erich Kron | Feb 10, 2026 | Artificial Intelligence, Cyber Resilience, Personal Security
As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of...
by Pat Breen | Feb 10, 2026 | Cyber Resilience, Personal Security
Introduction On Safer Internet Day, it’s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper...
by Gagan Gulati | Feb 9, 2026 | Crypto, Blockchain, and Quantum, Cyber Resilience, Data Management, Data Security
Introduction As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting to a...
by Russell Fishman | Feb 9, 2026 | Cyber Resilience, Data Management, Personal Security, Security Awareness
Introduction The gaming industry is in the midst of an extraordinary transformation. Immersive digital worlds, AI-driven gameplay, and massive global online communities are reshaping how we play, connect, and innovate. But as this digital ecosystem grows, so does the...
by David Wiseman | Feb 5, 2026 | Artificial Intelligence, Encryption & Cipher, Identity & Access Management, Secure Communications
The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary...
by Gagan Gulati | Feb 3, 2026 | Artificial Intelligence, Cyber Resilience, Security Operations
The pace and complexity of adversarial attacks is rapidly evolving. According to the 2024 Cybersecurity Visibility Study conducted by NetApp and Futurum Group, more than half (54%) of enterprises have experienced a cyberattack in the past 12-18 months. Even more...
by Gagan Gulati | Jan 30, 2026 | Artificial Intelligence, Cyber Resilience, Data Management, Data Security, Governance & Risk
2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this evolution, I have noted three...
by The Production Team | Jan 29, 2026 | Personal Security, Security Awareness, Threat Intelligence
Over the last month, Barracuda threat analysts have investigated the following email threats targeting organisations and their employees: Tycoon phishing kit using QR codes built out of HTML tables Callback phishing through Microsoft Teams Facebook-themed...
by Morey Haber | Jan 28, 2026 | Identity & Access Management, Learning & Education, Risk Management
In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is...
by Craig Ford | Jan 27, 2026 | Personal Security
In today’s modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter...
by Agnidipta Sarkar | Jan 21, 2026 | Cyber Resilience, Microsegmentation, Security Operations
I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos...
by Maaz Yasin | Jan 20, 2026 | Encryption & Cipher, Executive Communication, National Security, Secure Communications
Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with...
by Vanta | Jan 15, 2026 | Compliance & Legal, Exposure Management, Governance & Risk, Risk Management, Security Operations
Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally...