Accelerating the adoption of passkeys without compromising user experience
27 June, 2025 by Geoff Schomburgk* | Supplied by: Yubico IncWe need authentication methods that remove the human element from the equation, and that's where passkeys come in.
Modern CISOs must throw out the traditional cybersecurity playbook
26 June, 2025 by Aaron Momin*The primary imperative for today's CISOs should be to align the security agenda with business value.
Nearly half of Australian companies opt to pay ransoms: report
26 June, 2025 | Supplied by: Sophos Pty LtdA recent survey found that Australian ransom payments have decreased from 66% to 41% in the past year, and demands have dropped considerably in value.
Barracuda launches vulnerability detection tool
25 June, 2025 by Dylan Bushell-Embling | Supplied by: Barracuda NetworksBarracuda Networks has introduced a new solution aimed at helping organisations uncover and mitigate even previously unknown vulnerabilities.
AI agents: securing the 'artificial workforce'
24 June, 2025 by Tony Burnside* | Supplied by: NetskopeJust as they would with new employees, security teams will need to define access policies for each new AI agent to avoid over-permissioning.
The near future of analytics in the AI era
19 June, 2025 | Supplied by: GartnerGartner predicts that 75% of analytics content will use GenAI for enhanced contextual intelligence by 2027.
Guardian agents will support trustworthy AI: Gartner
13 June, 2025 | Supplied by: GartnerIn the future, guardian agents will ensure AI processes stay reliable and secure as the AI risk surface expands, according to Gartner.
Commvault acts to protect against new quantum threats
11 June, 2025 by Dylan Bushell-Embling | Supplied by: CommVault Systems IncCommvault's new post-quantum cryptography capabilities aim to help protect businesses against emerging security threats such as 'harvest now, decrypt later'.
The AI advantage being seen in Australian SOCs
05 June, 2025 by Les Williamson, ANZ Regional Director, Check Point Software Technologies | Supplied by: Check Point Software Technologies LtdA much clearer picture is emerging about where artificial intelligence is advantageous in cybersecurity research and operational settings.
Cybersecurity starts with employees
04 June, 2025 by Jacqueline Jayne*As the cyberthreat landscape continues to evolve rapidly, the gap between technical defences and human awareness continues to grow.
Threat actors using aggressive new extortion tactics: report
29 May, 2025 | Supplied by: Palo Alto NetworksThe latest extortion and ransomware report from Palo Alto Networks reveals aggressive new tactics and the escalation of threat actor collaboration.
Australia's cyber defences are being stress-tested by geopolitics. Is the nation ready?
22 May, 2025 by James Hayes, Senior Vice President of Global Government Affairs, Tenable | Supplied by: Tenable APACIn a volatile geopolitical climate, reactive cybersecurity isn't just inadequate — it's dangerous.
Tenable adds third-party connectors to Tenable One
20 May, 2025 by Dylan Bushell-Embling | Supplied by: Tenable APACTenable has introduced a range of third-party data connectors to its Tenable One cyber risk exposure management platform.
From passwords to passwordless: building Australia's next cybersecurity frontier
20 May, 2025 by Mary Attard* | Supplied by: AccentureWhy the strongest password is not having one at all.
Arctic Wolf launches incident response platform
20 May, 2025 by Dylan Bushell-EmblingArctic Wolf has launched a new solution combining incident readiness with incident response coverage into a single platform.