Security

Critical alert: exploitation of Cisco SD-WAN appliances

27 February, 2026

The Australian Cyber Security Centre urges immediate action over a critical alert regarding an ongoing vulnerability in Cisco Catalyst SD-WAN appliances.


Tenable warns of supply chain attack on npm Registry

26 February, 2026 by Dylan Bushell-Embling | Supplied by: Tenable APAC

A malicious app added to the npm Registry had been downloaded around 50,000 times in the five hours before it was removed, according to Tenable Research.


ASD launches malware analysis tool on GitHub

25 February, 2026

ASD says its new open-source tool, Azul, will allow oganisations to explore, analyse and correlate malware at scale.


Cloudflare adds post‍-‍quantum support to SASE platform

25 February, 2026 by Dylan Bushell-Embling | Supplied by: Cloudflare

Cloudflare has progressed its mission of upgrading its product offerings to support post‍-‍quantum cryptography.


Akamai and NVIDIA develop OT security solution

24 February, 2026 by Dylan Bushell-Embling | Supplied by: Akamai Technologies

Akamai and NVIDIA have jointly developed a solution for enabling zero trust security capabilities for operational technology and industrial control systems.


Why we need to redefine cybersecurity success to support CISOs

19 February, 2026 by Andrew Kay, APJ Director Systems Engineering, Illumio | Supplied by: Illumio

When Notifiable Data Breaches statistics are released we should look at the nature of the breaches and how they were managed, rather than focus on the number of breaches.


Rubrik launches Rubrik Agent Cloud

19 February, 2026 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty Ltd

Rubrik has launched into general availability a solution aimed at helping enterprises deploy AI agents without compromising on security or governance.


Is 2026 the year of identity? Just follow the money

18 February, 2026 by Chris Kelly* | Supplied by: Delinea

What $40 billion in cyber acquisitions says about the future of identity security.


Check Point unveils AI security strategy

17 February, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies Ltd

Check Point says it has developed a four‍-‍pillar strategy aimed at transforming its operations around helping organisations securely adopt AI.


Proactive cybersecurity must lead innovation in Australia’s AI future

16 February, 2026 by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis | Supplied by: Armis

AI presents extraordinary opportunities for productivity, innovation and growth but it also amplifies risk.


Palo Alto completes CyberArk acquisition

13 February, 2026 | Supplied by: Palo Alto Networks

Palo Alto has completed the acquisition of identity security company CyberArk, establishing identity security as a core pillar of its platform strategy.


RCE vulnerability discovered in Microsoft Power BI

12 February, 2026 | Supplied by: The Missing Link

The Missing Link has announced the disclosure of CVE‍-‍2026‍-‍21229, a Power BI Remote Code Execution (RCE) vulnerability.


Australia's biggest cyber breaches aren't hacks, they're access failures

09 February, 2026 by Ben Mudie, Field CTO for APJ, Tenable | Supplied by: Tenable APAC

The largest cyber breaches have rarely been sophisticated and were often preventable.


CrowdStrike achieves ISO certification for AI security

28 January, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrike

CrowdStrike has achieved ISO 42001 certification, validating its approach to responsible AI-powered cybersecurity practices.


Check Point establishes Auckland PoP

23 January, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies Ltd

Check Point has expanded its presence in New Zealand with the launch of a local data residency instance of its Check Point Harmony SASE suite.


  • All content Copyright © 2026 Westwick-Farrow Pty Ltd