ASD launches malware analysis tool on GitHub
25 February, 2026ASD says its new open-source tool, Azul, will allow oganisations to explore, analyse and correlate malware at scale.
Akamai and NVIDIA develop OT security solution
24 February, 2026 by Dylan Bushell-Embling | Supplied by: Akamai TechnologiesAkamai and NVIDIA have jointly developed a solution for enabling zero trust security capabilities for operational technology and industrial control systems.
Rubrik launches Rubrik Agent Cloud
19 February, 2026 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty LtdRubrik has launched into general availability a solution aimed at helping enterprises deploy AI agents without compromising on security or governance.
Why we need to redefine cybersecurity success to support CISOs
19 February, 2026 by Andrew Kay, APJ Director Systems Engineering, Illumio | Supplied by: IllumioWhen Notifiable Data Breaches statistics are released we should look at the nature of the breaches and how they were managed, rather than focus on the number of breaches.
Is 2026 the year of identity? Just follow the money
18 February, 2026 by Chris Kelly* | Supplied by: DelineaWhat $40 billion in cyber acquisitions says about the future of identity security.
Check Point unveils AI security strategy
17 February, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies LtdCheck Point says it has developed a four-pillar strategy aimed at transforming its operations around helping organisations securely adopt AI.
Proactive cybersecurity must lead innovation in Australia’s AI future
16 February, 2026 by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis | Supplied by: ArmisAI presents extraordinary opportunities for productivity, innovation and growth but it also amplifies risk.
Palo Alto completes CyberArk acquisition
13 February, 2026 | Supplied by: Palo Alto NetworksPalo Alto has completed the acquisition of identity security company CyberArk, establishing identity security as a core pillar of its platform strategy.
RCE vulnerability discovered in Microsoft Power BI
12 February, 2026 | Supplied by: The Missing LinkThe Missing Link has announced the disclosure of CVE-2026-21229, a Power BI Remote Code Execution (RCE) vulnerability.
Australia's biggest cyber breaches aren't hacks, they're access failures
09 February, 2026 by Ben Mudie, Field CTO for APJ, Tenable | Supplied by: Tenable APACThe largest cyber breaches have rarely been sophisticated and were often preventable.
CrowdStrike achieves ISO certification for AI security
28 January, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrikeCrowdStrike has achieved ISO 42001 certification, validating its approach to responsible AI-powered cybersecurity practices.
Check Point establishes Auckland PoP
23 January, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies LtdCheck Point has expanded its presence in New Zealand with the launch of a local data residency instance of its Check Point Harmony SASE suite.
Cyber lessons from 2025: why human risk will define 2026
22 January, 2026 by Erich Kron, CISO Advisor at KnowBe4 | Supplied by: KnowBe4Success in 2026 will come from building security into the rhythm of business, where technology, people and leadership move in lockstep.
CrowdStrike and Nord Security to bolster SMB defences
13 January, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrikeCrowdStrike and Nord Security have teamed up to develop joint AI-powered security offerings for SMB customers.
2026 will be the year identity defines cyber defence
12 January, 2026 by Art Gilliland*2025 gave us an initial look at what happens when AI scales faster than identity controls.
