News & Thoughts

Unlike every other security source, we don’t get stuck down in the technical weeds. Our remit is to collect breaking news and thought-leadership pieces from experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation.

New Articles

Trend Micro Ranks #1 in Attack Protection in Rigorous MITRE Engenuity ATT&CK® Evaluations

Trend Micro Ranks #1 in Attack Protection in Rigorous MITRE Engenuity ATT&CK® Evaluations

Delivers standout performance against Turla adversary group with 100% protection rate read more

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

The perimeters of technological defences are shifting, and—in some cases—disappearing altogether. read more

SentinelOne® achieves 100% prevention and detection in MITRE Engenuity ATT&CK Evaluation

SentinelOne® achieves 100% prevention and detection in MITRE Engenuity ATT&CK Evaluation

Singularity™ XDR provides real-time protection with zero delays or configuration changes read more

Article Archive

LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions. READ MORE

More Than Two-Thirds of Manufacturing Companies Hit by Ransomware Had Their Data Encrypted, Sophos Survey Finds
IT-OT Security Convergence Key to Optimising Risk Management

IT-OT Security Convergence Key to Optimising Risk Management

Latest report reveals major visibility gaps in operational technology detection and response READ MORE

Enterprises to Spend $12.9B on Private 5G Network Security by 2027

Enterprises to Spend $12.9B on Private 5G Network Security by 2027

Organisations are looking for solutions that integrate neatly with existing technologies READ MORE

Australians Believe It’s Time for Mobile Development to Step In to Protect them From Data Breaches and Fraud: Appdome Survey

Australians Believe It’s Time for Mobile Development to Step In to Protect them From Data Breaches and Fraud: Appdome Survey

More than a quarter of Australian consumers fear their mobile apps will be breached and need mobile developers to invest more in delivering robust cyber protection in mobile apps, says market research sponsored by Appdome. READ MORE

Generative AI: Putting it to Work to Improve IT Security

Generative AI: Putting it to Work to Improve IT Security

Since being unveiled to the public a little over six months ago, the generative AI platform ChatGPT has focused attention on the potential of artificial intelligence. READ MORE

OT:ICEFALL – New Vulnerabilities and Insights on OT Security Design and Patching

OT:ICEFALL – New Vulnerabilities and Insights on OT Security Design and Patching

In Forescout’s final OT:ICEFALL report, Forescout Vedere Labs presents three new vulnerabilities and concludes the project after one year of research following the original disclosure. READ MORE

The Recap: Risk to Resilience – ANZ

The Recap: Risk to Resilience – ANZ

Trend Micro is currently running one of the largest cybersecurity roadshows ever, the ‘Risk to Resilience World Tour’ covering more than 120 locations around the globe.  READ MORE

Virtual Patching

Virtual Patching

Scenario 1:MyBank Pty Ltd has 300+ critical legacy enterprise applications. Almost all of them were built by the then IT-savvy non-developers. They were built with limited or no design considerations. Security was not even a design-criteria back then. These applications continue to run either because they are now too complex, too critical, or the backbone for many dependent systems and hence cannot be substituted. Scenario 2:MyEstore Pty Ltd has had substantial growth within the last decade. It uses many third-party and open-source components for a better user experience. While the application has scaled up in the past couple years, most of the core code remains the same. With their eCommerce site running 24x7, it is simply not feasible to update the core functions to handle ever-evolving attack vectors. Also, the third-party and open-source components have rarely been ... READ MORE

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Accenture State of Cyber Resilience 2023 report reveals key traits of “cyber transformers,” who make cybersecurity the cornerstone of their business transformation efforts READ MORE

APJ’s retail, hotel and travel sectors faced over 1.15 billion web attacks in the last year

APJ’s retail, hotel and travel sectors faced over 1.15 billion web attacks in the last year

APJ’s web attacks in these sectors were largely driven by Australia, China and India and ranked second highest globally READ MORE

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy