Dumping Ground
Start:
Start:
End:

Register

Editors Pick

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in...

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among software development team members.

Six Trends Shaping The Future Of The Security Industry In 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.

Malicious AdTech And Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.

No results found.
No results found.
Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in. Read More

Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid rise and evolution of PhaaS is driving a ... Read More

Cybersecurity In 2025: What Will And Needs To Transpire

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand threats. 2025 should be the Year of the SBOM (Software Bill of Materials). We MUST know as much about our own software - AND all third party software we deploy on our own behalf - as we do about our endpoints, servers and VMs. We can look forward to a much lower tolerance level for employees and third parties who do not align with our maturing cybersecurity policies in the future. Read More

Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered encryption (PQE) and homomorphic encryption, can protect sensitive data at rest and in transit, rendering stolen information useless to attackers. By focusing on data confidentiality, businesses can reduce the leverage attackers hold in extortion scenarios. However, the article emphasises that encryption alone is not enough—organisations must also maintain robust cybersecurity practices, such as regular backups and proactive threat management, to stay resilient in the face of ransomware. Read More

The Four Key Challenges Facing AI Adoption In Australian Banks

The Four Key Challenges Facing AI Adoption In Australian Banks

Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more personalised customer experiences, and boost operational efficiency at a scale we’ve never seen before. But for all its promise, many banks are still struggling to tap into AI’s full potential. Read More

Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era

Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era

Gary Savarino, Identity Strategist for APAC at SailPoint shares his recommendations for businesses to adopt a unified identity security approach to safeguard data. Read More

Share This