by David Hope | Apr 8, 2026 | National Security, Network Security, Physical Security, Security Operations
Introduction In Australia, the intensity of our airport and aviation security is strangely famous worldwide. It even has its own reality television show; Border Security – Australia’s Front Line. The scene is always similar: drug sniffing dogs, x-ray machines and...
by Rochelle Cervantes | Apr 3, 2026 | Application Security, Artificial Intelligence, Cloud Security, Cyber Resilience
The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake...
by MJ Robotham | Apr 2, 2026 | Risk Management, Security Operations
Introduction Australian organisations’ technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once...
by Kumar Mitra | Apr 2, 2026 | Artificial Intelligence, Governance & Risk, Leadership
Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear...
by James Greenwood | Apr 2, 2026 | Cyber Resilience, Leadership, Security Operations
Introduction Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of...
by Kavya Shastry | Apr 2, 2026 | Artificial Intelligence, Leadership, Risk Management, Security Operations
Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making...
by Harshvendra Soin | Mar 30, 2026 | Artificial Intelligence, Executive Communication, Governance & Risk
In the Asia, Pacific and Japan (APJ) region, one of the biggest challenges for businesses isn’t technology, it’s communication. The region spans more than 23 major languages, multiple dialects and profoundly different business cultures. Translating messages correctly...
by Christoph Nagy | Mar 18, 2026 | Application Security
Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated,...
by Daniel Sutherland | Mar 17, 2026 | Cyber Resilience, Security Operations
Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public...
by Mathieu Chevalier | Mar 13, 2026 | Identity & Access Management, Physical Security
Access control has long been treated as a function of facilities teams, focused on unlocking and locking doors. As digital systems and physical spaces become more interconnected, that point of view needs to be rethought. Access control is now playing an added role to...
by Lee Shelford | Mar 13, 2026 | Physical Security, Security Operations
In a security operations centre, operators are often asked to review hours of video surveillance footage to understand incidents that lasted only minutes. Investigations typically involve switching between camera views, aligning timelines, and manually scanning...
by Praveena Raman | Mar 10, 2026 | IWD
International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely...
by Ashley Diffey | Mar 9, 2026 | Artificial Intelligence, Identity & Access Management
As artificial intelligence transforms digital commerce and the workplace, it is also dismantling the foundations of online trust. In an environment where deepfakes can mimic executives, synthetic identities can pass background checks, and AI-powered phishing campaigns...
by Louise Humphreys | Mar 6, 2026 | Artificial Intelligence
In this article Owen Lamont from Acadian Asset Management revisits Einstein’s Depression-era warning about “technological unemployment” and argues that the real economic threat may not be AI itself, but the narrative that AI will replace us all. Einstein’s...
by Vikas Tatwani | Mar 5, 2026 | Artificial Intelligence, Security Operations
The digital footprint of Australian organisations is no longer confined to enterprise boundaries: public cloud adoption has risen steadily over the past few years; more than 80 percent of enterprises follow a hybrid work model; and the multi-access edge computing...
by Raymond Schippers | Mar 3, 2026 | Artificial Intelligence, Offensive Security, Security Operations
Introduction Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains...
by Matias Madou | Mar 2, 2026 | Product Development
If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to...
by Christopher Hills | Feb 24, 2026 | Identity & Access Management, Security Operations
For more than a decade, cybersecurity professionals have repeated a now-familiar mantra: identity is the new perimeter. However, in many organisations, identity security remains fragmented, inconsistently governed and poorly understood across increasingly complex...
by Scott Morris | Feb 23, 2026 | Personal Security, Security Awareness, Social Engineering, Threat Intelligence
Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of...
by Joris van de Vis | Feb 18, 2026 | Application Security
Hackers are becoming increasingly sophisticated by the day. Ever-evolving cyber threats are happening at an overwhelming pace. Organizations using SAP systems have become favorite targets for cybercriminals. For SAP users, the necessity for comprehensive cybersecurity...
by Riccardo Di Blasio | Feb 18, 2026 | Artificial Intelligence, Cyber Resilience, Data Management
I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by...
by Vanta | Feb 18, 2026 | Compliance & Legal, Leadership, Security Operations
Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance...
by Gagan Gulati | Feb 16, 2026 | Artificial Intelligence, Cyber Resilience
AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double...
by Cam Perry | Feb 14, 2026 | Artificial Intelligence, Network Security, Product Development
The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has...
by John Kolm | Feb 12, 2026 | Artificial Intelligence, Personal Security
When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the...
by Ritesh Chugh | Feb 12, 2026 | Personal Security, Social Engineering
As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship,...
by Gagan Gulati | Feb 10, 2026 | Crypto, Blockchain, and Quantum, Cyber Resilience, Data Management
The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified...
by David Magee | Feb 10, 2026 | Critical Infrastructure, Leadership, Security Operations
From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have...
by Ben Mudie | Feb 10, 2026 | Application Security, Executive Communication, Leadership, Security Operations
Introduction Boards today have never seen more cyber risk data. Dashboards glow with heat maps, scores, alerts and reassuring trend lines. Cyber is now a standing agenda item, backed by metrics designed to prove the organisation is in control. And yet, beneath this...
by Erich Kron | Feb 10, 2026 | Artificial Intelligence, Cyber Resilience, Personal Security
As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of...
by Pat Breen | Feb 10, 2026 | Cyber Resilience, Personal Security
Introduction On Safer Internet Day, it’s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper...
by Gagan Gulati | Feb 9, 2026 | Crypto, Blockchain, and Quantum, Cyber Resilience, Data Management
Introduction As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting to a...
by Russell Fishman | Feb 9, 2026 | Cyber Resilience, Data Management, Personal Security, Security Awareness
Introduction The gaming industry is in the midst of an extraordinary transformation. Immersive digital worlds, AI-driven gameplay, and massive global online communities are reshaping how we play, connect, and innovate. But as this digital ecosystem grows, so does the...
by David Wiseman | Feb 5, 2026 | Artificial Intelligence, Encryption & Cipher, Identity & Access Management, Secure Communications
The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary...
by Gagan Gulati | Feb 3, 2026 | Artificial Intelligence, Cyber Resilience, Security Operations
The pace and complexity of adversarial attacks is rapidly evolving. According to the 2024 Cybersecurity Visibility Study conducted by NetApp and Futurum Group, more than half (54%) of enterprises have experienced a cyberattack in the past 12-18 months. Even more...
by Gagan Gulati | Jan 30, 2026 | Artificial Intelligence, Cyber Resilience, Data Management, Governance & Risk
2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this evolution, I have noted three...
by The Production Team | Jan 29, 2026 | Personal Security, Security Awareness, Threat Intelligence
Over the last month, Barracuda threat analysts have investigated the following email threats targeting organisations and their employees: Tycoon phishing kit using QR codes built out of HTML tables Callback phishing through Microsoft Teams Facebook-themed...
by Morey Haber | Jan 28, 2026 | Identity & Access Management, Learning & Education, Risk Management
In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is...
by Craig Ford | Jan 27, 2026 | Personal Security
In today’s modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter...
by Agnidipta Sarkar | Jan 21, 2026 | Cyber Resilience, Microsegmentation, Security Operations
I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos...
by Maaz Yasin | Jan 20, 2026 | Encryption & Cipher, Executive Communication, National Security, Secure Communications
Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with...
by Vanta | Jan 15, 2026 | Compliance & Legal, Exposure Management, Governance & Risk, Risk Management, Security Operations
Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally...
by Greg Sullivan | Jan 15, 2026 | Leadership, Security Operations, Work & Careers
The ceaseless nature and high sophistication of today’s AI-driven cyber threats are unrelenting and daunting. An alarmingly high 85% of cybersecurity professionals anticipate leaving their jobs due to burnout. Burnout impacts our most important line of defense – our...
by Sam Salehi | Jan 14, 2026 | Risk Management
As we head into 2026, cybersecurity leaders are facing a paradox. Organisations have never invested more in security tools, data and talent – yet many CISOs admit they have less confidence in their true risk posture than ever before. The problem isn’t a lack of...
by Paul Zimski | Jan 12, 2026 | Executive Communication, Leadership, Secure Communications
For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over...
by Christine Gadsby | Jan 6, 2026 | Encryption & Cipher, Executive Communication, Secure Communications
In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned...
by Vanta | Jan 5, 2026 | Compliance & Legal, Governance & Risk, Leadership, Security Operations
Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools,...
by Agnidipta Sarkar | Dec 22, 2025 | Microsegmentation, Reports & Predictions, Security Operations, Zero Trust
As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For...