by Rajesh Ganesan | Oct 27, 2025 | Artificial Intelligence, Identity & Access Management, Security Operations
Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, with individuals using it to help them with everyday tasks, boardrooms discussing how best to implement it in their business, and more. However,...
by Craig Searle | Oct 22, 2025 | Crypto, Blockchain, and Quantum, Security Awareness, Security Operations, Threat Intelligence
Introduction Cybercrime has matured into a highly structured global economy, rivalling legitimate industries in sophistication and profitability. The World Economic Forum projects that cybercrime will cost the global economy $10.5 trillion in 2025, effectively making...
by Chirag Joshi | Oct 15, 2025 | Artificial Intelligence, Governance & Risk
AI is no longer a future concept. It is already reshaping how we work, how decisions are made, and how organisations operate. The pace of adoption is relentless. In many organisations, AI is embedded into workflows even when no formal policy or governance exists. This...
by Ankur Jain | Oct 15, 2025 | ANZ, Artificial Intelligence, Government & Policy
Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of...
by Gareth Russell | Oct 15, 2025 | Cyber Resilience, Encryption & Cipher, Government & Policy
Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like...
by ColorTokens | Oct 10, 2025 | Microsegmentation, Security Awareness, Security Operations, Threat Intelligence
“Please wait, your document is loading.” That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant...
by Matias Madou | Oct 10, 2025 | Application Security, Artificial Intelligence
Introduction Constantly on the hunt to find new ways to disrupt IT infrastructures, cybercriminals are increasingly shifting their attention from penetrating networks to exploiting software vulnerabilities. While this trend has been evident for some time, it is...
by Harry Chichadjian | Oct 10, 2025 | ANZ, Artificial Intelligence, Cyber Resilience
Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption,...
by Scott Hesford | Oct 8, 2025 | Identity & Access Management
Introduction Identity is now one of the most critical risk exposure points for organisations – frequently targeted and exploited by attackers to gain footholds, escalate privileged access, and move laterally within environments. A recent study found that 90% of...
by Jeremy Thomas | Oct 6, 2025 | Artificial Intelligence, Banking & Finance, Personal Security, Security Awareness, Social Engineering
Embedding fraud intelligence into the digital banking experience will enable you to protect your customers more effectively. Introduction Are you confident your institution is doing all that it can to stop bad actors separating customers from their hard-earned funds?...
by Louis Eichenbaum | Oct 3, 2025 | Government & Policy, Microsegmentation, Security Operations, Zero Trust
Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal...
by Pamela Hornilla | Oct 3, 2025 | Artificial Intelligence, Executive Communication, Leadership, Work & Careers
Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new...
by Mandy Andress | Oct 3, 2025 | Artificial Intelligence, Leadership, Security Operations
Introduction Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, voice, and video at scale, increasing impersonation scams and malware campaigns. In response...
by Gareth Cox | Oct 2, 2025 | Compliance & Legal, Cyber Resilience, Security Operations, Supply Chain
Introduction Australia’s cybersecurity landscape is evolving at a pace that few businesses and public-sector organisations can comfortably manage. It’s a situation marked by three interconnected challenges: a rapidly expanding attack surface, the weaponisation of...
by David Land | Sep 29, 2025 | ANZ, Cloud Security, Compliance & Legal, Leadership, Security Operations
Introduction As hybrid cloud infrastructures continue to evolve, they are increasingly subject to AI-driven risks, complex data environments, and growing cyberthreats. Our recent 2025 Hybrid Cloud Security Survey underscores the rising pressure faced by organisations...
by Ramon Pinero | Sep 29, 2025 | Critical Infrastructure, Executive Communication, Physical Security, Secure Communications, Security Operations
Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response – leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap”...
by Curtis Simpson | Sep 25, 2025 | ANZ, Crypto, Blockchain, and Quantum, Cyber Resilience, Government & Policy, Security Operations
Introduction Quantum computing offers unquestionable opportunities for Australian businesses, but it also tests the resilience of current cybersecurity frameworks and underscores the need to prepare and adapt cyber defences. Whilst still in its early stages, future...
by Scott Ellis | Sep 22, 2025 | Investment, Leadership, Supply Chain
Introduction In an environment where the shortage of skilled cyber security professionals continues to be an issue, it’s logical to think organisations would be carefully vetting security vendors not just on functionality, but also on their ability to reduce...
by Sam Salehi | Sep 18, 2025 | Executive Communication, Leadership, Reports & Predictions, Risk Management
Introduction Cybersecurity has a communication problem and it’s costing us. If CISOs want to earn trust, investment and influence, they need to speak the business’ love language. Within organisations, everyone has their own “love language.” Engineers...
by Matthew Lowe | Sep 15, 2025 | Leadership, Security Operations, Threat Intelligence
Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success With the number and sophistication of artificial intelligence (AI)-powered cyberattacks continuing to increase, many security operations centres (SOCs) are being pushed to their limits....
by William Oh | Sep 10, 2025 | Reports & Predictions, Security Awareness, Security Operations, Threat Intelligence
Introduction The rapid evolution of ransomware and its ability to disrupt operations through penetrating critical systems demands serious attention. BlueVoyant found that the first half of 2025 in ransomware has been marked by new attack strategies, focus on...
by Pamela Hornilla | Sep 10, 2025 | Critical Infrastructure, Cyber Resilience, OT Security, Security Operations
Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on,...
by Morey Haber | Sep 10, 2025 | Identity & Access Management, Offensive Security, Security Operations, Social Engineering
A critical infrastructure operator sought evidence of an intrusion; investigators instead found many ‘open doors’ into the environment. Introduction When authorities were engaged recently on a proactive hunt exercise with a critical infrastructure operator, the intent...
by Jamie O'Reilly | Sep 7, 2025 | Banking & Finance, Personal Security, Security Operations, Social Engineering, Threat Intelligence
Introduction When it comes to consumer fintech, attackers do not need to steal credentials or plant malware. They need a poorly protected endpoint with something valuable behind it. That is what unfolded with TCN – The Card Network, a popular multi-retailer gift...
by Jarrod Lucia | Sep 4, 2025 | Application Security, Artificial Intelligence, Offensive Security
Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a...
by Rick Vanover | Sep 4, 2025 | Cyber Resilience, Leadership, Security Operations
Introduction In today’s hyper-connected business environment, where AI-driven systems, multi-cloud strategies, and edge computing dominate conversations, it’s tempting to chase every emerging risk with equal urgency. But when it comes to resilience, success doesn’t...
by Bob Huber | Sep 4, 2025 | Application Security, Artificial Intelligence, Leadership, Security Operations
Introduction Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow...
by Sumir Bhatia | Sep 1, 2025 | ANZ, Government & Policy, Leadership, Security Awareness, SMB
Introduction Scam tactics are growing in scale and sophistication, and so must our collective vigilance. Australians reported over $119 million in scam-related losses in the first four months of 2025. If we are to take anything from this Scam Awareness Week, it’s that...
by Paul Davis | Aug 26, 2025 | Application Security, Compliance & Legal, Governance & Risk
Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security...
by The Production Team | Aug 26, 2025 | Artificial Intelligence, Leadership, Work & Careers
Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the...
by Reuben Koh | Aug 25, 2025 | Leadership, Reports & Predictions, Security Awareness, Security Operations, SMB
Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s...
by Noam Moshe | Aug 21, 2025 | Offensive Security, Physical Security, Security Operations, Threat Intelligence
Executive Summary Team82 has disclosed four vulnerabilities in Axis Communications’ popular line of video surveillance products. Axis published an urgent advisory. The vulnerabilities could expose thousands of organisations to attack. Team82 developed an exploit chain...
by Michael Fisher | Aug 15, 2025 | Application Security
Introduction Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a...
by Morey Haber | Aug 15, 2025 | Identity & Access Management, Security Operations
Modern enterprise IT environments have grown increasingly complex, comprising sprawling networks of users, devices, servers, and cloud services. With this growth comes a pressing vulnerability in the rise of hidden identity risks that threaten to undermine even the...
by Vikas Tatwani | Aug 13, 2025 | Artificial Intelligence, Cyber Resilience, Leadership, Security Operations
“…Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 —...
by Matias Madou | Aug 11, 2025 | Application Security, Artificial Intelligence, Governance & Risk
Since OpenAI’s ChatGPT burst onto the tech scene in late 2022, artificial intelligence (AI) tools have rapidly become embedded in the workflows of software developers. Praised for their speed, efficiency, and ability to assist with complex tasks, AI coding assistants...
by Michael Murphy | Jul 31, 2025 | Critical Infrastructure, Cyber Resilience, Security Operations, Threat Intelligence
Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and...
by Simon Laskaj | Jul 31, 2025 | Application Security, Artificial Intelligence, Data Management, Security Operations
Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to...
by Jamie O'Reilly | Jul 30, 2025 | Application Security, Personal Security, Security Operations
When you’re trying to grow the next big mobile app, going viral is one of the key signs of success. But, going app-viral costs more than people first realise. On the surface, that might make sense. More users mean more costs, it’s just part of doing...
by Ankita Dhakar | Jul 29, 2025 | Cyber Resilience, Leadership, Security Awareness
Introduction In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver licences, passport numbers, and financial details. While remediation focused on containment and response, one quiet question lingered for many...
by James Moorhouse | Jul 28, 2025 | Cyber Resilience
Most organisations plan for the future through a best attempt at guessing what’s coming and hoping they’re right. Wargaming flips that—letting you test the future, pressure-test your plans, and uncover what breaks before it breaks you. Once the preserve of military...
by Steve Katanas | Jul 23, 2025 | Cyber Resilience, GENERAL, Physical Security
As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and...
by Faraz Ali | Jul 23, 2025 | Critical Infrastructure, Cyber Resilience, TECHNOLOGY
As AI continues to drive digital transformation around the world, data centres are taking on a new role. They’re no longer just back-end infrastructure – they’re fast becoming prime targets in a shifting cybersecurity landscape. With the rapid rise of AI,...
by Jeff Kaplan | Jul 23, 2025 | Cyber Resilience, Identity & Access Management, OT Security, Physical Security
As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded...
by Johan Fantenberg | Jul 23, 2025 | Governance & Risk
In an era where cyber threats loom large over organisations of all sizes, one of the most effective strategies for mitigating internal risks is the principle of Separation of Duties (SoD). Traditionally associated with financial management and compliance, SoD is now...
by Les Williamson | Jul 21, 2025 | Cyber Resilience
In an age where digital infrastructure underpins nearly every facet of corporate operations, operational resilience has become a non-negotiable priority for Australian businesses. Increasingly, the responsibility for embedding this resilience is falling to the Chief...
by Nathan Kerr | Jul 19, 2025 | Announcements, Banking & Finance
Verifying identity during tax time shouldn’t be a hassle. But for many Australians, outdated systems and limited ID options turn a simple process into a frustrating one. That’s why One Click has integrated ConnectID®, a digital identity solution developed by...
by Darrin Iatrou | Jul 16, 2025 | Critical Infrastructure, IoT & Robotics, Security Operations, Zero Trust
Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a...