by Spintel | Jul 3, 2025 | Security Operations, SMB, Telco
Introduction Setting up internet for your business is not a one size fits all exercise. Whether you’re running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact...
by Grant Geyer | Jul 3, 2025 | Critical Infrastructure, Investment, Leadership, Security Operations, Threat Intelligence
Overview This wasn’t a super sophisticated cyber attack; it was someone logging into a control system with too little security and opening a dam valve all the way. While the impact was minimal – 447 litres/second of flooding – it’s a reminder that the same...
by John Harding | Jul 3, 2025 | ANZ, Data Management, Governance & Risk, Security Operations
Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it...
by John Deeb | Jul 2, 2025 | Artificial Intelligence, Innovation, Investment, Leadership, Security Operations
Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. It is estimated that 1.3 million technology workers will be needed in Australia...
by Matt Miller | Jul 2, 2025 | Identity & Access Management, Security Awareness, Zero Trust
Introduction We live in an era where our digital identity is just as valuable — if not more so — than our physical presence. From the moment we sign up for a new service, subscribe to a newsletter, or tap “accept” on a cookie policy, we begin to create a data...
by Pamela Hornilla | Jun 30, 2025 | Risk Management
Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps...
by Pamela Hornilla | Jun 30, 2025 | Artificial Intelligence, Cloud Security
In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite....
by Reuben Koh | Jun 29, 2025 | Crisis Management, Executive Communication, Exposure Management, Security Operations
Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals...
by Pamela Hornilla | Jun 27, 2025 | Artificial Intelligence, Crisis Management, News and Updates
In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and...
by Ivano Bongiovanni | Jun 26, 2025 | ANZ, Critical Infrastructure, Cyber Resilience, Investment, Network Security, Security Operations, Threat Intelligence
Introduction Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response. ...
by Asadullah Rathore | Jun 24, 2025 | Artificial Intelligence, BUSINESS
Asadullah (Asad) Rathore, Head of Professional Services – cyber security and AI consulting, Excite Cyber (ASX:EXT) As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber...
by Ankur Jain | Jun 24, 2025 | Artificial Intelligence
GenAI, automation and Machine Learning (ML) are driving generational change – reshaping the future of business and society as we know it. However, for these capabilities to accelerate innovation at an organisational level, Australian enterprises must overcome a...
by Johan Fantenberg | Jun 23, 2025 | Supply Chain
In the modern global economy, supply chains are no longer just physical networks but have become vast digital ecosystems. At the heart of these systems lies a challenge that is rapidly gaining prominence among cybersecurity professionals: third-party digital access....
by Christopher Hills | Jun 23, 2025 | Identity & Access Management
In an era where cyberattacks are growing in scale and sophistication, digital identities have emerged as the new battleground. Once the exclusive domain of Identity and Access Management (IAM) teams, identity security is now a core cybersecurity and business...
by Jay S. Goodman | Jun 20, 2025 | Leadership, Secure Communications, Security Operations
Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and...
by Zak Menegazzi | Jun 18, 2025 | Exposure Management
With the new financial year approaching, Australian organisations face a pressing imperative to strengthen their cyber defences and heighten their vigilance against cyberwarfare. Modern cyberwarfare is marked by a surge in state-sponsored attacks, the weaponisation of...
by Matias Madou | Jun 18, 2025 | Artificial Intelligence
The rapid adoption of artificial intelligence (AI) coding assistants has transformed software development, offering much-needed relief for developers grappling with growing workloads and tight delivery timelines. These generative AI tools have been widely embraced for...
by Gareth Cox | Jun 18, 2025 | Exposure Management
In an increasingly digital world, Australian businesses are more vulnerable than ever to one of the most dangerous yet underestimated cybersecurity risks: insider threats. These threats, which originate from within an organisation, pose a unique challenge as they...
by Pamela Hornilla | Jun 17, 2025 | Leadership, Risk Management
In Episode 4 of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed what’s really dragging security down in modern organisations. And spoiler, it’s not the hackers. If you’re someone in tech, security, or just trying to make sense of how to run a...
by Pascal Geenens | Jun 12, 2025 | Artificial Intelligence
The recent release of DeepSeek-R1 by the Chinese startup DeepSeek has garnered a lot of interest and could spark a new wave of innovation, potentially rebalancing the state of AI supremacy between the major competitors on the global stage. By introducing unique...
by Pamela Hornilla | Jun 12, 2025 | Leadership
In Episode 2 of the DevSecOops podcast, hosts Tom Walker, James Vincent, and Scott Fletcher explored one of the biggest yet most overlooked challenges in organisations today: how to make the right decisions, especially when business, technology, and security...
by Jason Merrick | Jun 11, 2025 | Identity & Access Management
The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden...
by Sunny Rao | Jun 6, 2025 | Artificial Intelligence
Software has become the undisputed driver of business today. As the reliance on software has grown, so have the moving parts needed to make it, especially amid the rise of generative artificial intelligence (GenAI). As a result, software development has become a...
by Peter Graves | Jun 5, 2025 | Artificial Intelligence
Australia’s manufacturing sector is integral to the country’s economic framework, employing over 850,000 individuals and contributing approximately 6% to the national GDP.. However, challenges such as supply chain disruptions alongside workforce shortages, escalating...
by Pamela Hornilla | Jun 5, 2025 | Cloud Security, Critical Infrastructure
Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure. With recent news out of the US and...
by Rohit Nayak | Jun 5, 2025 | Artificial Intelligence
As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education,...
by Pamela Hornilla | Jun 4, 2025 | Cyber Resilience, Risk Management
Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a guest a special guest Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently,...
by Pamela Hornilla | Jun 4, 2025 | Cloud Security
DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services),...
by Bitdefender | Jun 4, 2025 | Exposure Management, Security Operations, Threat Intelligence
This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational...
by Pamela Hornilla | Jun 2, 2025 | Leadership
Serving on a corporate board is often seen as the pinnacle of a professional career, the natural, coveted ‘next step’ after decades of climbing the corporate ladder. For many, it is the picture of executives in sharp suits, convening in a high-rise building, and...
by Scott Bridgen | May 30, 2025 | Leadership, Risk Management
Introduction The nature of corporate risk in Australia is evolving rapidly at a strategic, reputational, and liability level. As the next five years shape up to be even more disruptive in the world of risk management, Australian boards need to begin paying swift...
by Johan Fantenberg | May 29, 2025 | Artificial Intelligence
Australia’s financial services sector is confronting a fast-emerging and deeply insidious threat: deepfakes. Once considered digital curiosities or entertainment gimmicks, deepfakes are now formidable tools in the arsenal of cybercriminals. They are synthetic media...
by Gary Salman | May 29, 2025 | Artificial Intelligence, Critical Infrastructure
Artificial intelligence (AI) is revolutionizing healthcare by streamlining patient management and optimizing operations, making processes faster and more efficient. However, as practices adopt these advancements, cybercriminals are leveraging AI to exploit...
by Ben Hartwig | May 26, 2025 | Artificial Intelligence, Identity & Access Management, Risk Management
Companies maintain internal databases for sensitive information. However, sometimes employees want to take work home or believe it is easier to save files on their systems. These seemingly minor and understandable oversights introduce a new and growing threat to all...
by Helen Masters | May 23, 2025 | Artificial Intelligence
As I travel around the Asia-Pacific and Japan region and meet with Smartsheet customers and partners, I’ve seen firsthand the impact of our AI-powered platform on hundreds of thousands of users. Their creativity and passion for the platform makes me enthusiastic for...
by Stephen Gillies | May 22, 2025 | Exposure Management
While compliance ensures steady improvements to application security, the cadence of upgrades is not enough to meet best practice or evolving customer expectations. Internet-based applications might run the digital world, but their security is an ever-present concern,...
by John Penn | May 20, 2025 | Compliance & Legal, Cyber Resilience, Leadership
Introduction The rapidly evolving cyber-risk landscape sees a cyber attack every six minutes in Australia, with a new wave of threats enabled by AI.1 The ability to manage cyber risks whilst at the same time delivering technological transformation places CISOs and...
by Pamela Hornilla | May 19, 2025 | Artificial Intelligence, Cyber Resilience, Governance & Risk, Risk Management
Strategic advisor at Semperis, Simon Hodgkinson, discussed the ongoing state-sponsored cyberattacks, particularly in Australia. With decades of experience as a cybersecurity leader in software, financial services, and energy industry, Hodgkinson shared valuable...
by Sam Salehi | May 7, 2025 | Risk Management
This Global Cybersecurity Week is a timely reminder that cyber risk is no longer a technical issue – it’s a business imperative. As threat actors move faster and AI amplifies the speed and precision of attacks, organisations must evolve how they manage and reduce...
by Olly Stimpson | May 5, 2025 | Security Awareness
As the boundaries between our personal and professional lives continue to blur, World Password Day is a timely reminder that this convergence extends to how we manage passwords. The human element remains a well-known challenge for security and identity professionals....
by Bitdefender | May 1, 2025 | Personal Security, Security Awareness, Threat Intelligence
Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken...
by Dr. Renee Burton | Apr 29, 2025 | ANZ
A $ 945 million – that is how much money Australian consumers reported losing to investment scams in 2024. Often victims are only trying to create financial security and build a failsafe for the future. Instead, they are manipulated, defrauded, and left more...
by Matias Madou | Apr 22, 2025 | Application Security, Cyber Resilience, Security Operations
Introduction With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices. Essentially,...
by Scott Ellis | Apr 22, 2025 | Application Security, Banking & Finance, Network Security
As digital banking, fintech innovations, and mobile transactions continue to reshape the global financial landscape, cybersecurity threats have become increasingly sophisticated. The financial sector, being the backbone of the global economy, is a prime target for...
by Sanket Sharma | Apr 17, 2025 | Crisis Management, Data Management, Digital Forensics
Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured...
by Andy Milburn | Apr 16, 2025 | Compliance & Legal, Crisis Management, Data Management, Risk Management, Security Operations
In today’s digital-first economy, data can be both a powerful asset and a significant liability. Companies that proactively manage their data can achieve multiple positive business outcomes such as making optimal use of their storage infrastructure while...
by Ionut Baltariu | Apr 10, 2025 | Personal Security, Reports & Predictions, Security Awareness, Threat Intelligence
In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns....
by James Tennant | Apr 9, 2025 | Banking & Finance, Leadership
Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical...