Entrust enhances platform to support stage 2 AML laws
22 April, 2026 by Dylan Bushell-Embling | Supplied by: Entrust International LLC (Australia)Entrust has enhanced its identity security platform to support phase 2 of Australia's Anti-Money Laundering and Counter-Terrorism Financing regime.
Harvest now, decrypt later: why your encrypted data has an expiry date
21 April, 2026 by Mahesh Krishnan, Chief Technology Officer for Oceania at Fujitsu | Supplied by: Fujitsu AustraliaQuantum communications represent a rare type of disruption: one that is both predictable and already in motion.
Supply chains are growing faster than their security
16 April, 2026 by Kash Sharma, Managing Director ANZ, BlueVoyant | Supplied by: BlueVoyantMore third parties mean more entry points, more dependencies and more opportunities for adversaries to find the weakest link in the chain.
KnowBe4 launches Agent Risk Manager
16 April, 2026 by Dylan Bushell-Embling | Supplied by: KnowBe4KnowBe4's Agent Risk Manager solution is designed to help IT teams secure, monitor and govern the behaviour of AI agents.
Identity at the edge
13 April, 2026 by Dr. Kawin Boonyapredee, APJ CISO Advisor, KnowBe4 | Supplied by: KnowBe4How the sixth annual identity management day highlights the new frontiers of trust.
ACSC warns of ongoing targeting of online code repositories
07 April, 2026The Australian Cyber Security Centre has released a high priority alert regarding the ongoing targeting of online code repositories.
BeyondTrust introduces tools for securing AI agents
26 March, 2026 by Dylan Bushell-Embling | Supplied by: BeyondTrustIdentity security company BeyondTrust has enhanced its Pathfinder Platform with tools designed to improve observability and security of AI agents and workloads.
Why legacy systems have become cybersecurity's least trusted zone
25 March, 2026 by Ben Mudie, Field CTO for APJ at Tenable | Supplied by: Tenable APACLegacy systems are often portrayed as technical problems. However, in practice, they are a serious governance concern.
CrowdStrike and NVIDIA develop secure-by-design AI blueprint
19 March, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrikeCrowdStrike has arranged to integrate its Falcon security platform into the open-source NVIDIA OpenShell run-time for autonomous AI agents.
Unit42 discloses severe flaw in Google's Gemini
13 March, 2026 by Dylan Bushell-Embling | Supplied by: Palo Alto NetworksResearchers from Palo Alto Networks' Unit 42 have detailed their discovery of a high-severity vulnerability in Google's Gemini Live in Chrome AI feature.
SentinelOne unveils identity security portfolio
11 March, 2026 by Dylan Bushell-Embling | Supplied by: SentinelOneSentinelOne has developed its security platform with capabilities aimed at safeguarding businesses against sophisticated identity-based attacks.
Bitdefender identifies new malware attack model
10 March, 2026 by Dylan Bushell-Embling | Supplied by: BitdefenderBitdefender researchers have identified an attack technique known as vibeware, which involves using AI to develop large volumes of malware in niche languages.
Genetec launches cloud-native physical security tool
05 March, 2026 by Dylan Bushell-Embling | Supplied by: Genetec Australia Pty LtdGenetec's Cloudlink 2210 has been designed to help enterprises complete complex deployments of cloud-managed physical security systems.
VAST Data partners with CrowdStrike to secure AI stack
04 March, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrikeVAST Data and CrowdStrike have partnered to bring threat detection and response capabilities to the environments where AI systems are built and operated.
Critical alert: exploitation of Cisco SD-WAN appliances
27 February, 2026The Australian Cyber Security Centre urges immediate action over a critical alert regarding an ongoing vulnerability in Cisco Catalyst SD-WAN appliances.
