News & Thoughts

Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation.

New Articles

Progress Offers Free Application Development Training for Anyone Who Wants to Learn Code

Progress Offers Free Application Development Training for Anyone Who Wants to Learn Code

Online program intended for new and experienced developers who are interested in building modern applications more efficiently, enhancing their skill set and growing their careers. read more

Nozomi Networks Releases New Content Pack for ISA/IEC 62443 Compliance Reporting and Security Checks

Nozomi Networks Releases New Content Pack for ISA/IEC 62443 Compliance Reporting and Security Checks

Simplifies compliance reporting and speeds security assessments for industrial automation and control systems. read more

2022 Zero-day exploitation continues at an elevated pace

2022 Zero-day exploitation continues at an elevated pace

Mandiant, now a part of Google Cloud, tracked 55 zero-day vulnerabilities that the company judges to have been exploited in 2022. Although this count is lower than the ... read more

Article Archive

Rapid7 Vulnerability Intelligence Report Shows Attackers Developing and Deploying Exploits Faster Than Ever

Rapid7 Vulnerability Intelligence Report Shows Attackers Developing and Deploying Exploits Faster Than Ever

Analysis of security vulnerability trends shows an 87% increase in first-week exploitation since 2020 READ MORE

Security Emerges As A Critical Input To User Experience Decisions

Security Emerges As A Critical Input To User Experience Decisions

Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey. READ MORE

IBM Report: Ransomware Persisted Despite Improved Detection in 2022

IBM Report: Ransomware Persisted Despite Improved Detection in 2022

Manufacturing Most Extorted Industry; Email Thread Hijacking Attempts Spike; Time to Ransom Moves from Months to Days. READ MORE

Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security

Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security

84% of codebases contained at least one known open source vulnerability, an almost 4% increase from last year’s findings. READ MORE

Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)

Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)

23 Feb 2023 6:00 AM   Dr Samar Fatima, Research Fellow, Enterprise AI and Data Analytics Hub  Topics: Google, Bard, AI, artificial intelligence, ChatGPT  “The race for search engine supremacy is getting fierce amongst tech giants with the release of Open AI’s ChatGPT instilling competitive fear in those bigger companies such as Google.  “Google’s rushed announcement of its AI chat service, Bard, before it was ready was a knee jerk response which could be detrimental to the maturity of the AI industry.   “There have been concerns around Bard’s accuracy, which emerged when it returned a factually incorrect answer after being asked "What new discoveries from the James Webb Space Telescope can I tell my 9-year-old about”?”    “While Google rushed the announcement of Bard, Microsoft took a collaborative approach by investing ... READ MORE

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by Verizon's Threat Research Advisory Centre (VTRAC), and serve as a stark warning of what the future may hold. Indeed, the scale of the challenge led to the Minister for Home Affairs and Cyber Security, Claire O’Neil, vowing to “make Australia the world’s most cyber secure country by 2030”, conceding there is considerable work to be done. Minister O’Neil pointed out that for the first time in our history, espionage and foreign interference have replaced terrorism, with Australia becoming a persistent target of cyber espionage over the ... READ MORE

Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape READ MORE

The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it READ MORE

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats READ MORE

Why 2023 is the Year to Implement a Zero-Trust Strategy

Why 2023 is the Year to Implement a Zero-Trust Strategy

Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks. READ MORE

How to establish a ‘security-aware’ business culture

How to establish a ‘security-aware’ business culture

When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck. READ MORE

ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

New Research Highlights Uncertainty Around XDR Definition, Implementation and Resources Needed READ MORE