Recent Podcasts
Recent Articles
Register
Editors Pick
Podcasts
Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk
Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in. Read More
Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection
Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid rise and evolution of PhaaS is driving a ... Read More
Cybersecurity In 2025: What Will And Needs To Transpire
In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand threats. 2025 should be the Year of the SBOM (Software Bill of Materials). We MUST know as much about our own software - AND all third party software we deploy on our own behalf - as we do about our endpoints, servers and VMs. We can look forward to a much lower tolerance level for employees and third parties who do not align with our maturing cybersecurity policies in the future. Read More
Protecting Data from Ransomware: The Power of Advanced Encryption
Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered encryption (PQE) and homomorphic encryption, can protect sensitive data at rest and in transit, rendering stolen information useless to attackers. By focusing on data confidentiality, businesses can reduce the leverage attackers hold in extortion scenarios. However, the article emphasises that encryption alone is not enough—organisations must also maintain robust cybersecurity practices, such as regular backups and proactive threat management, to stay resilient in the face of ransomware. Read More
The Four Key Challenges Facing AI Adoption In Australian Banks
Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more personalised customer experiences, and boost operational efficiency at a scale we’ve never seen before. But for all its promise, many banks are still struggling to tap into AI’s full potential. Read More
Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era
Gary Savarino, Identity Strategist for APAC at SailPoint shares his recommendations for businesses to adopt a unified identity security approach to safeguard data. Read More