Security

ASD launches malware analysis tool on GitHub

25 February, 2026

ASD says its new open-source tool, Azul, will allow oganisations to explore, analyse and correlate malware at scale.


Akamai and NVIDIA develop OT security solution

24 February, 2026 by Dylan Bushell-Embling | Supplied by: Akamai Technologies

Akamai and NVIDIA have jointly developed a solution for enabling zero trust security capabilities for operational technology and industrial control systems.


Rubrik launches Rubrik Agent Cloud

19 February, 2026 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty Ltd

Rubrik has launched into general availability a solution aimed at helping enterprises deploy AI agents without compromising on security or governance.


Why we need to redefine cybersecurity success to support CISOs

19 February, 2026 by Andrew Kay, APJ Director Systems Engineering, Illumio | Supplied by: Illumio

When Notifiable Data Breaches statistics are released we should look at the nature of the breaches and how they were managed, rather than focus on the number of breaches.


Is 2026 the year of identity? Just follow the money

18 February, 2026 by Chris Kelly* | Supplied by: Delinea

What $40 billion in cyber acquisitions says about the future of identity security.


Check Point unveils AI security strategy

17 February, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies Ltd

Check Point says it has developed a four‍-‍pillar strategy aimed at transforming its operations around helping organisations securely adopt AI.


Proactive cybersecurity must lead innovation in Australia’s AI future

16 February, 2026 by Zak Menegazzi, Cybersecurity Specialist, ANZ, Armis | Supplied by: Armis

AI presents extraordinary opportunities for productivity, innovation and growth but it also amplifies risk.


Palo Alto completes CyberArk acquisition

13 February, 2026 | Supplied by: Palo Alto Networks

Palo Alto has completed the acquisition of identity security company CyberArk, establishing identity security as a core pillar of its platform strategy.


RCE vulnerability discovered in Microsoft Power BI

12 February, 2026 | Supplied by: The Missing Link

The Missing Link has announced the disclosure of CVE‍-‍2026‍-‍21229, a Power BI Remote Code Execution (RCE) vulnerability.


Australia's biggest cyber breaches aren't hacks, they're access failures

09 February, 2026 by Ben Mudie, Field CTO for APJ, Tenable | Supplied by: Tenable APAC

The largest cyber breaches have rarely been sophisticated and were often preventable.


CrowdStrike achieves ISO certification for AI security

28 January, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrike

CrowdStrike has achieved ISO 42001 certification, validating its approach to responsible AI-powered cybersecurity practices.


Check Point establishes Auckland PoP

23 January, 2026 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies Ltd

Check Point has expanded its presence in New Zealand with the launch of a local data residency instance of its Check Point Harmony SASE suite.


Cyber lessons from 2025: why human risk will define 2026

22 January, 2026 by Erich Kron, CISO Advisor at KnowBe4 | Supplied by: KnowBe4

Success in 2026 will come from building security into the rhythm of business, where technology, people and leadership move in lockstep.


CrowdStrike and Nord Security to bolster SMB defences

13 January, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrike

CrowdStrike and Nord Security have teamed up to develop joint AI‍-‍powered security offerings for SMB customers.


2026 will be the year identity defines cyber defence

12 January, 2026 by Art Gilliland*

2025 gave us an initial look at what happens when AI scales faster than identity controls.


  • All content Copyright © 2026 Westwick-Farrow Pty Ltd