Dumping Ground
Start:
Start:
End:

Register

Editors Pick

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry – outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans.

Hybrid Mesh Security in the Age of AI and Ransomware

By adopting hybrid mesh security principles and embracing AI-enhanced controls, security leaders can effectively disrupt the sophisticated ransomware attack chain and establish resilient, future-proof defences against the evolving threats of the digital age.

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Australian IT leaders report strong confidence in their organisation’s resilience — yet the SolarWinds 2025 IT Trends Report shows a more complicated reality. While most believe they can withstand today’s demands, that confidence drops when facing challenges like AI adoption, cyber threats, or evolving regulations such as CPS 230. Nearly half of IT teams still spend a significant portion of their week addressing critical issues, suggesting resilience may be overestimated. The report highlights that real resilience depends on the strength of teams, clarity of workflows, and the effectiveness of tools. It calls for organisations to examine how people work together, where processes break down, and whether technology genuinely supports outcomes. True resilience is built through visibility, alignment, and continuous improvement, not assumptions.

No results found.
Post Qantas Breach What Happens Now

Post Qantas Breach What Happens Now

​Months after a breach hit Qantas Airways, the airline recently confirmed that stolen customer information has now been ...
No results found.
No results found.
No results found.
No results found.
No results found.
2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry - outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans. Read More

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Australian IT leaders report strong confidence in their organisation’s resilience — yet the SolarWinds 2025 IT Trends Report shows a more complicated reality. While most believe they can withstand today’s demands, that confidence drops when facing challenges like AI adoption, cyber threats, or evolving regulations such as CPS 230. Nearly half of IT teams still spend a significant portion of their week addressing critical issues, suggesting resilience may be overestimated. The report highlights that real resilience depends on the strength of teams, clarity of workflows, and the effectiveness of tools. It calls for organisations to examine how people work together, where processes break down, and whether technology genuinely supports outcomes. True resilience is built through visibility, alignment, and continuous improvement, not assumptions. Read More

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the ... Read More

AI to Supercharge Cyber Threats Across Australia

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced ... Read More

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and that connection has created real exposure. The stakes are higher because manufacturing downtime isn’t just an inconvenience. It halts revenue, disrupts supply chains, and puts safety at risk. Here’s the issue: attackers have figured out that manufacturers are a soft entry point ... Read More

AI to Supercharge Cyber Threats Across Australia

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.  Here are the top security trends to watch out for in 2026 and beyond: Compressed Attack Timelines Due to Autonomous AI In 2026, the rapid acceleration of autonomous AI-driven attacks will be one of the top challenges facing Australian organisations.  Attackers will utilise both generative and autonomous AI capabilities to identify weaknesses, test entry points and launch exploits ... Read More

Share This