by Nam Lam | May 7, 2026 | ANZ, Identity & Access Management, Leadership, Physical Security
Most Australian enterprises believe they have identity security under control. Frameworks are in place, policies are documented, and zero trust strategies feature prominently in boardroom presentations and annual reports. On paper, it looks robust. In practice, many...
by Zak Menegazzi | May 7, 2026 | Application Security, Artificial Intelligence, Exposure Management
Introduction The era of “vibe coding” is officially here, and Asia Pacific is central to this trend, already hosting a rising number of vibe coding start-ups. AI coding has accelerated software delivery to a breakneck pace, but this velocity has come with...
by Morey Haber | May 7, 2026 | Cyber Resilience, Identity & Access Management, Leadership, Security Operations
Introduction During the past decade, one lesson has become unmistakably clear for enterprise leaders: security begins and ends with identity. As organisations continue to digitise operations, shift workloads to the cloud, and experiment with AI-driven automation,...
by Nam Lam | May 1, 2026 | Application Security, Identity & Access Management, Leadership, Security Operations
Why the Illusion of Control Is Failing Australian Identity Security Programmes Most Australian enterprises believe they have identity security under control. Frameworks are in place, policies are documented, and zero trust strategies feature prominently in boardroom...
by Pouya Ghotbi | May 1, 2026 | Exposure Management, Security Operations
As geopolitical tensions continue to ripple across global markets, cyber activity is following a predictable and increasingly dangerous pattern. Spikes in scanning, probing, and exploitation attempts often occur within hours of international instability, placing...
by Blackberry | Apr 29, 2026 | Encryption & Cipher, Identity & Access Management, Secure Communications, Security Operations
The digital battle lines are being redrawn. Cyber threats are no longer confined to hacked servers or ransomware incidents affecting corporate networks. They have migrated to the devices in our hands and pockets. Mobile espionage is accelerating in speed, scope, and...
by Hai Nakash | Apr 29, 2026 | Banking & Finance, Continuous Business, Crypto, Blockchain, and Quantum
Introduction For years, digital assets have been spoken about in extremes. Either as the future of finance, or as a space filled with risk and uncertainty. In my view, the truth sits somewhere in the middle. Over the past decade, digital assets have delivered...
by Blackberry | Apr 26, 2026 | Encryption & Cipher, Europe and Central Asia, Government & Policy, Identity & Access Management, Secure Communications, Security Operations
Government in Constant Motion Federal government work now extends beyond offices to secure facilities, international forums, temporary work sites and even on the daily commute. Mobility has shifted from a supporting function into a core pillar of daily operations...
by Pieter Danhieux | Apr 23, 2026 | Application Security, Cyber Resilience
Introduction A quarter of a century after the Agile Manifesto reshaped the software industry, its legacy is no longer in question. The methodology’s emphasis on speed, adaptability and user-centric design helped redefine how organisations build and deliver technology,...
by Blackberry | Apr 19, 2026 | Crypto, Blockchain, and Quantum, Cyber Resilience, Encryption & Cipher, Secure Communications, Security Operations
When a single compromised communication can disrupt governments, expose intelligence operations, or derail emergency responses, the question isn’t whether your organization has secure communications. Rather, it’s whether your communications tools are certified...
by Scott Hesford | Apr 17, 2026 | Continuous Business, Identity & Access Management, Leadership, Security Operations
In office buildings around the world, the instruction is clear and universally understood: in case of fire, break glass. The act is deliberate, visible and reserved for emergencies only. In cybersecurity, however, the equivalent mechanism, the so-called “break glass...
by Blackberry | Apr 16, 2026 | Encryption & Cipher, Security Operations, Threat Intelligence
The most dangerous attacks against secure communications don’t decrypt your messages. They compromise the device before encryption occurs — then watch every keystroke, every screen, and every conversation in plaintext. CVE-2026-21385 is the latest documented...
by John Deeb | Apr 16, 2026 | Data Management, Data Security, Governance & Risk, Identity & Access Management
Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with...
by Sean Deuby | Apr 15, 2026 | Identity & Access Management, Security Operations
The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the...
by Blackberry | Apr 13, 2026 | Encryption & Cipher, Executive Communication, Personal Security, Secure Communications
Dutch intelligence has confirmed what enterprise security architects have long understood: consumer-grade messaging apps, regardless of their encryption implementation, are structurally unfit for sensitive government and military communications. The reason is not...
by Peter Cardassis | Apr 13, 2026 | Artificial Intelligence, Government & Policy
Introduction Logicalis Australia is calling for a shift in how Australia approaches artificial intelligence (AI), warning that the country risks missing a major global opportunity if it continues to focus primarily on policy and access to compute rather than...
by David Hope | Apr 8, 2026 | National Security, Network Security, Physical Security, Security Operations
Introduction In Australia, the intensity of our airport and aviation security is strangely famous worldwide. It even has its own reality television show; Border Security – Australia’s Front Line. The scene is always similar: drug sniffing dogs, x-ray machines and...
by Rochelle Cervantes | Apr 3, 2026 | Application Security, Artificial Intelligence, Cloud Security, Cyber Resilience
The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake...
by MJ Robotham | Apr 2, 2026 | Risk Management, Security Operations
Introduction Australian organisations’ technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once...
by Kumar Mitra | Apr 2, 2026 | Artificial Intelligence, Governance & Risk, Leadership
Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear...
by James Greenwood | Apr 2, 2026 | Cyber Resilience, Leadership, Security Operations
Introduction Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of...
by Kavya Shastry | Apr 2, 2026 | Artificial Intelligence, Leadership, Risk Management, Security Operations
Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making...
by Harshvendra Soin | Mar 30, 2026 | Artificial Intelligence, Executive Communication, Governance & Risk
In the Asia, Pacific and Japan (APJ) region, one of the biggest challenges for businesses isn’t technology, it’s communication. The region spans more than 23 major languages, multiple dialects and profoundly different business cultures. Translating messages correctly...
by Christoph Nagy | Mar 18, 2026 | Application Security
Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated,...
by Daniel Sutherland | Mar 17, 2026 | Cyber Resilience, Security Operations
Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public...
by Mathieu Chevalier | Mar 13, 2026 | Identity & Access Management, Physical Security
Access control has long been treated as a function of facilities teams, focused on unlocking and locking doors. As digital systems and physical spaces become more interconnected, that point of view needs to be rethought. Access control is now playing an added role to...
by Lee Shelford | Mar 13, 2026 | Physical Security, Security Operations
In a security operations centre, operators are often asked to review hours of video surveillance footage to understand incidents that lasted only minutes. Investigations typically involve switching between camera views, aligning timelines, and manually scanning...
by Praveena Raman | Mar 10, 2026 | IWD
International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely...
by Ashley Diffey | Mar 9, 2026 | Artificial Intelligence, Identity & Access Management
As artificial intelligence transforms digital commerce and the workplace, it is also dismantling the foundations of online trust. In an environment where deepfakes can mimic executives, synthetic identities can pass background checks, and AI-powered phishing campaigns...
by Louise Humphreys | Mar 6, 2026 | Artificial Intelligence
In this article Owen Lamont from Acadian Asset Management revisits Einstein’s Depression-era warning about “technological unemployment” and argues that the real economic threat may not be AI itself, but the narrative that AI will replace us all. Einstein’s...
by Vikas Tatwani | Mar 5, 2026 | Artificial Intelligence, Security Operations
The digital footprint of Australian organisations is no longer confined to enterprise boundaries: public cloud adoption has risen steadily over the past few years; more than 80 percent of enterprises follow a hybrid work model; and the multi-access edge computing...
by Raymond Schippers | Mar 3, 2026 | Artificial Intelligence, Offensive Security, Security Operations
Introduction Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains...
by Matias Madou | Mar 2, 2026 | Product Development
If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to...
by Christopher Hills | Feb 24, 2026 | Identity & Access Management, Security Operations
For more than a decade, cybersecurity professionals have repeated a now-familiar mantra: identity is the new perimeter. However, in many organisations, identity security remains fragmented, inconsistently governed and poorly understood across increasingly complex...
by Scott Morris | Feb 23, 2026 | Personal Security, Security Awareness, Social Engineering, Threat Intelligence
Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of...
by Joris van de Vis | Feb 18, 2026 | Application Security
Hackers are becoming increasingly sophisticated by the day. Ever-evolving cyber threats are happening at an overwhelming pace. Organizations using SAP systems have become favorite targets for cybercriminals. For SAP users, the necessity for comprehensive cybersecurity...
by Riccardo Di Blasio | Feb 18, 2026 | Artificial Intelligence, Cyber Resilience, Data Management
I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by...
by Vanta | Feb 18, 2026 | Compliance & Legal, Leadership, Security Operations
Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance...
by Gagan Gulati | Feb 16, 2026 | Artificial Intelligence, Cyber Resilience
AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double...
by Cam Perry | Feb 14, 2026 | Artificial Intelligence, Network Security, Product Development
The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has...
by John Kolm | Feb 12, 2026 | Artificial Intelligence, Personal Security
When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the...
by Ritesh Chugh | Feb 12, 2026 | Personal Security, Social Engineering
As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship,...
by Gagan Gulati | Feb 10, 2026 | Crypto, Blockchain, and Quantum, Cyber Resilience, Data Management
The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified...
by David Magee | Feb 10, 2026 | Critical Infrastructure, Leadership, Security Operations
From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have...
by Ben Mudie | Feb 10, 2026 | Application Security, Executive Communication, Leadership, Security Operations
Introduction Boards today have never seen more cyber risk data. Dashboards glow with heat maps, scores, alerts and reassuring trend lines. Cyber is now a standing agenda item, backed by metrics designed to prove the organisation is in control. And yet, beneath this...
by Erich Kron | Feb 10, 2026 | Artificial Intelligence, Cyber Resilience, Personal Security
As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of...
by Pat Breen | Feb 10, 2026 | Cyber Resilience, Personal Security
Introduction On Safer Internet Day, it’s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper...
by Gagan Gulati | Feb 9, 2026 | Crypto, Blockchain, and Quantum, Cyber Resilience, Data Management, Data Security
Introduction As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting to a...