News & Thoughts

Unlike every other security source, we don’t get stuck down in the technical weeds. Our remit is to collect breaking news and thought-leadership pieces from experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation.

New Articles

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities read more

Verizon Threat Research Advisory Center (VTRAC) celebrates 20th anniversary

Verizon Threat Research Advisory Center (VTRAC) celebrates 20th anniversary

Cybersecurity Awareness Month kicks off next week, and with the continued rise in cyberthreats worldwide, for businesses to help protect their assets, they need a fail-proof ... read more

Fortinet announces formation of Veterans Program Advisory Council to narrow the cybersecurity skills gap with military veteran talent

Fortinet announces formation of Veterans Program Advisory Council to narrow the cybersecurity skills gap with military veteran talent

Council members from Five Eyes nations will help advance the Fortinet Veterans Program’s impact on supporting military veterans in transitioning to careers in cybersecurity read more

Article Archive

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

The perimeters of technological defences are shifting, and—in some cases—disappearing altogether. READ MORE

IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages

IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages

SolarWinds, the leading provider in software management solutions and observability serving 96% of the Fortune 500, has released its 10th annual IT Trends Report, detailing the impact observability solutions have on navigating challenges from digital transformation, moving to the cloud and remote work—both within the IT department and beyond. READ MORE

Automating evidence collection will improve your cloud incident response process

Automating evidence collection will improve your cloud incident response process

A primary concern of any security team is having the ability to respond to security events efficiently and in a timely manner, well before they are at risk of escalating. The lack of automation coupled with alert fatigue often leads to overlooked risk, where seemingly low-severity detections may actually be connected to something far more malicious. To address this challenge and better protect your environment, it’s crucial to utilise automation at the core of your cloud incident response program to remove complexities and manual steps associated with incident investigations. READ MORE

How Water Utilities can Boost Their Cybersecurity Resilience

How Water Utilities can Boost Their Cybersecurity Resilience

Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses. READ MORE

Trustwave releases new SpiderLabs research focused on actionable cybersecurity intelligence for the hospitality industry

Trustwave releases new SpiderLabs research focused on actionable cybersecurity intelligence for the hospitality industry

Trustwave, a leading cybersecurity and managed security services provider, has released comprehensive research shedding light on the distinctive cybersecurity risks encountered by the hospitality sector. READ MORE

Best-Practice Ways to Prevent Phishing Attacks

Best-Practice Ways to Prevent Phishing Attacks

They’ve been a focus of attention for IT security teams for years, yet the threats posed by phishing campaigns are showing no sign of easing. Phishing remains a popular tactic for cybercriminals for one simple reason: it works. If a staff member can be tricked into clicking on a link or opening an email attachment containing malicious code, the result can be open access to their organisation’s entire IT infrastructure. READ MORE

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes. READ MORE

Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Since it first appeared late last year, ChatGPT has quickly built an extensive user base keen to put the evolving tool through its paces. READ MORE

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint has published its July Cyber Threat Intelligence Index which shows Australia was in the top 10 countries for ransomware attacks last month. READ MORE

Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Report underscores that email is the most exploited threat vector, Phishing remains borderless and attackers are increasingly impersonating trusted name brands READ MORE

Achieving a Robust Zero Trust Environment

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there. READ MORE

How Businesses Today can Prevent Advanced Cyber Threats

How Businesses Today can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously. READ MORE