Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one of the most overlooked weaknesses is the trade-off between inline protection and network uptime.
Introduction
On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first ...
Summary
Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage ...
Introduction
Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or ...
Introduction
Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical ...
Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate ...
Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered ...
VAST Data today announced a partnership with SK Telecom (SKT), South Korea’s leading telecommunications provider that’s transforming itself into an AI company. To deploy its ...
ESET launches ESET Cybersecurity Awareness Training in Australia, helping local businesses to avoid breaches resulting from human error.
ESET Cybersecurity Awareness ...
Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity ...
Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management ...
New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively