Quantum computing poses a significant threat to current encryption systems, making sensitive data vulnerable to future decryption by cybercriminals using "harvest now, decrypt later" tactics. To mitigate this risk, organizations must adopt post-quantum cryptography (PQC) standards, such as those developed by NIST, and integrate them into their data infrastructure to ensure long-term security and maintain trust in a quantum-powered future.
Today, businesses run on an invisible thread: supply chain. It links industries and consumers through numerous pathways, whether physical or digital. From ports to airlines ...
Shielding customers from scams and fraud and providing a safe online experience is paramount. Institutions that fail to do so will find themselves punished financially and ...
Introduction
For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no ...
Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity ...
Introduction
Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, ...
By focusing on measurable outcomes, such as speed of detection and response, rather than compliance checklists, Australia can build a digital economy that is not only ...
As drone technology becomes both more sophisticated and accessible across the country, researchers from Innovation Central Canberra (ICC) at the University of Canberra have ...
Nozomi Networks, the leader in OT, IoT, and CPS security, today announced the all-new Vantage IQ™ – the world’s first private, company-trained AI assistant for OT/IoT ...
Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. Our counts omitted one CVE that was assigned by ...
Strategic acquisition to unify PAM and just-in-time runtime authorisation for administrators, developers, non-human identities, and AI agents in a single platform
DroneShield has been selected as a supplier for the Australian Department of Defence’s Project LAND 156’s Line of Effort 3, which supports the Defence’s strategy to address ...