Security

Accelerating the adoption of passkeys without compromising user experience

27 June, 2025 by Geoff Schomburgk* | Supplied by: Yubico Inc

We need authentication methods that remove the human element from the equation, and that's where passkeys come in.


Modern CISOs must throw out the traditional cybersecurity playbook

26 June, 2025 by Aaron Momin*

The primary imperative for today's CISOs should be to align the security agenda with business value.


Nearly half of Australian companies opt to pay ransoms: report

26 June, 2025 | Supplied by: Sophos Pty Ltd

A recent survey found that Australian ransom payments have decreased from 66% to 41% in the past year, and demands have dropped considerably in value.


Barracuda launches vulnerability detection tool

25 June, 2025 by Dylan Bushell-Embling | Supplied by: Barracuda Networks

Barracuda Networks has introduced a new solution aimed at helping organisations uncover and mitigate even previously unknown vulnerabilities.


AI agents: securing the 'artificial workforce'

24 June, 2025 by Tony Burnside* | Supplied by: Netskope

Just as they would with new employees, security teams will need to define access policies for each new AI agent to avoid over‍-‍permissioning.


The near future of analytics in the AI era

19 June, 2025 | Supplied by: Gartner

Gartner predicts that 75% of analytics content will use GenAI for enhanced contextual intelligence by 2027.


Guardian agents will support trustworthy AI: Gartner

13 June, 2025 | Supplied by: Gartner

In the future, guardian agents will ensure AI processes stay reliable and secure as the AI risk surface expands, according to Gartner.


Commvault acts to protect against new quantum threats

11 June, 2025 by Dylan Bushell-Embling | Supplied by: CommVault Systems Inc

Commvault's new post-quantum cryptography capabilities aim to help protect businesses against emerging security threats such as 'harvest now, decrypt later'.


The AI advantage being seen in Australian SOCs

05 June, 2025 by Les Williamson, ANZ Regional Director, Check Point Software Technologies | Supplied by: Check Point Software Technologies Ltd

A much clearer picture is emerging about where artificial intelligence is advantageous in cybersecurity research and operational settings.


Cybersecurity starts with employees

04 June, 2025 by Jacqueline Jayne*

As the cyberthreat landscape continues to evolve rapidly, the gap between technical defences and human awareness continues to grow.


Threat actors using aggressive new extortion tactics: report

29 May, 2025 | Supplied by: Palo Alto Networks

The latest extortion and ransomware report from Palo Alto Networks reveals aggressive new tactics and the escalation of threat actor collaboration.


Australia's cyber defences are being stress‍-‍tested by geopolitics. Is the nation ready?

22 May, 2025 by James Hayes, Senior Vice President of Global Government Affairs, Tenable | Supplied by: Tenable APAC

In a volatile geopolitical climate, reactive cybersecurity isn't just inadequate — it's dangerous.


Tenable adds third‍-‍party connectors to Tenable One

20 May, 2025 by Dylan Bushell-Embling | Supplied by: Tenable APAC

Tenable has introduced a range of third‍-‍party data connectors to its Tenable One cyber risk exposure management platform.


From passwords to passwordless: building Australia's next cybersecurity frontier

20 May, 2025 by Mary Attard* | Supplied by: Accenture

Why the strongest password is not having one at all.


Arctic Wolf launches incident response platform

20 May, 2025 by Dylan Bushell-Embling

Arctic Wolf has launched a new solution combining incident readiness with incident response coverage into a single platform.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd