Recent Articles
Register



AI to Supercharge Cyber Threats Across Australia
AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced ... Read More
‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period
This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities. The surge in shopping ... Read More
Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue
Byline from Christopher Rule, General Manager of Defence, Security, and Resilence at GME about why cybersecurity is a sovereignty issue, on the back off ASD's recent Cyber Threat Report and ASIO Director-General Mike Burgess's speech on cyber espionage against critical infrastructure no longer being a hypothetical wartime scenario. Read More
Exploring Security In the Context of AI
Insights from the Cisco Live! "Redefining Security in the AI Era" Panel The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of ... Read More
‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period
This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities. The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise in digital transactions to hide malicious activity. The Perfect Storm of Old and New Attacks Attacks like phishing, account takeovers and payment fraud continue to dominate, but they spike during the holidays due to the sheer volume of legitimate traffic, which enables ... Read More
Australia’s Next Insider Threat Might Be an Algorithm
As Australian organisations race to embed AI tools across human resources, finance and operations, they may be missing a critical security fault line. While disgruntled employees or contractors gone rogue remain a concern, the next major data breach is increasingly likely to come from an algorithm that never intended malice. Read More














