Security

Guardian agents will support trustworthy AI: Gartner

13 June, 2025 | Supplied by: Gartner

In the future, guardian agents will ensure AI processes stay reliable and secure as the AI risk surface expands, according to Gartner.


Commvault acts to protect against new quantum threats

11 June, 2025 by Dylan Bushell-Embling | Supplied by: CommVault Systems Inc

Commvault's new post-quantum cryptography capabilities aim to help protect businesses against emerging security threats such as 'harvest now, decrypt later'.


The AI advantage being seen in Australian SOCs

05 June, 2025 by Les Williamson, ANZ Regional Director, Check Point Software Technologies | Supplied by: Check Point Software Technologies Ltd

A much clearer picture is emerging about where artificial intelligence is advantageous in cybersecurity research and operational settings.


Cybersecurity starts with employees

04 June, 2025 by Jacqueline Jayne*

As the cyberthreat landscape continues to evolve rapidly, the gap between technical defences and human awareness continues to grow.


Threat actors using aggressive new extortion tactics: report

29 May, 2025 | Supplied by: Palo Alto Networks

The latest extortion and ransomware report from Palo Alto Networks reveals aggressive new tactics and the escalation of threat actor collaboration.


Australia's cyber defences are being stress‍-‍tested by geopolitics. Is the nation ready?

22 May, 2025 by James Hayes, Senior Vice President of Global Government Affairs, Tenable | Supplied by: Tenable APAC

In a volatile geopolitical climate, reactive cybersecurity isn't just inadequate — it's dangerous.


From passwords to passwordless: building Australia's next cybersecurity frontier

20 May, 2025 by Mary Attard* | Supplied by: Accenture

Why the strongest password is not having one at all.


Arctic Wolf launches incident response platform

20 May, 2025 by Dylan Bushell-Embling

Arctic Wolf has launched a new solution combining incident readiness with incident response coverage into a single platform.


Tenable adds third‍-‍party connectors to Tenable One

20 May, 2025 by Dylan Bushell-Embling | Supplied by: Tenable APAC

Tenable has introduced a range of third‍-‍party data connectors to its Tenable One cyber risk exposure management platform.


Meta's new AI chatbot is yet another tool for harvesting data to potentially sell you stuff

16 May, 2025 by Uri Gal, Professor in Business Information Systems, University of Sydney

Meta AI might seem like just another entrant in the race to build smarter digital assistants, but beneath its inviting exterior it is a sophisticated data harvesting tool.


Just 8.5% of Aussie organisations have quantum‍-‍safe encryption

14 May, 2025 by Dylan Bushell-Embling | Supplied by: DigiCert

Research from DigiCert shows a wide gap between Australian enterprises' awareness of quantum computing threats and their preparedness.


Barracuda unveils multimodal AI threat detection tools

09 May, 2025 by Dylan Bushell-Embling | Supplied by: Barracuda Networks

Cybersecurity company Barracuda Networks is harnessing the power of multimodal AI to significantly enhance its threat detection capabilities.


Elastic develops automatic SIEM migration tool

02 May, 2025 by Dylan Bushell-Embling | Supplied by: Elastic

Elastic's new Automation Migration tool is designed to enable users of existing SIEM tools such as Splunk to easily migrate to Elastic Security.


CrowdStrike releases agentic AI for the SOC

30 April, 2025 by Dylan Bushell-Embling | Supplied by: CrowdStrike

At RSA in San Francisco this week, CrowdStrike has unveiled AI-powered innovations aimed at jumpstarting the next evolution of the SOC.


Despite rising concerns, 95% of orgs lack a quantum computing roadmap: ISACA

29 April, 2025

A quarter of poll respondents believe quantum computing’s transformative potential will be realised within five years yet 30% admit limited understanding of it.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd