I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.”
I know, breaches can be strenuous.
The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and brief executives. The focus is on containing the damage. But over time, the organization has grown into a connected digital enterprise, with everything seamlessly integrated. And this is why companies shut down entire operations.
But as soon as order is restored, after the initial chaos, stakeholders will question why, despite so many security tools, ...
The Voice of Cyber®
BUSINESS
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

Every few months, another “quantum-safe” technology is marketed as the real answer, usually with the claim that post-quantum cryptography isn’t enough. PQC is too new, ...
Introduction
In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to ...

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five ...

Months after a breach hit Qantas Airways, the airline recently confirmed that stolen customer information has now been released publicly by cybercriminals. This is despite ...

Graph databases are already proving their worth across fraud detection, compliance, and AI enablement. Their promise, however, extends further to a future where financial ...
Unpacking Cisco and Governance Institute’s AI Risk Report at Cisco Live! 2025
No results found.
In The News
Sort By
- Date
- Title
Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two ...
Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across ...
New service helps organisations identify cryptographic vulnerabilities and build scalable post-quantum strategies
Intensifying bot wars, a sharp rise in attacks on civil society organisations, and rapid progress in post-quantum encryption mark a pivotal year online.
Sharryn Napier, VP, GitHub, shares her predictions for 2026 in the wake of 2 million+ developers in Australia now building on the platform and as the government announces its ...
With unified AI prompt-layer protection, CrowdStrike secures enterprise AI everywhere it happens – from development through workforce usage
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
No results found.




