Cyber Security Living off the land (LotL) Attacks: How cybercriminals exploit your own tools

Here’s a reality check: attackers are hiding in plain sight, using your tools and systems against you. This is the unsettling world of Living off the... Read more

Cyber Security Security Culture & Awareness: Making cyber hygiene a business habit

In 2025, the cybersecurity threat landscape is more complex than ever. Hybrid work models have blurred the boundaries of the traditional perimeter.... Read more

Cyber Security Operational GRC: How to move from frameworks to functional compliance

In PwC’s 2025 Global Compliance Survey, 90% of Australian respondents say compliance has become more complex over the past three years, and they’re... Read more

IT & Cloud Australia’s top IT spending priorities in 2025 and what they tell us about 2026

Australia’s IT spending is far from slowing down. According to Gartner, it's forecast to exceed AUD 172 billion in 2026, an 8.9% increase from 2025.... Read more

Cyber Security How modern cybersecurity operations are evolving: Insights from The Missing Link

When Tim Niblett began his career in cybersecurity, firewalls and spam filters were the frontline and prevention was everything. Today, as Head of... Read more

Cyber Security How to build a future-proof compliance strategy

With Australia’s cybersecurity regulations tightening and new obligations coming into effect in 2025, compliance is no longer a once-a-year exercise.... Read more

IT & Cloud Cloud control in 2025- How to stay flexible, resilient and ready for what’s next

Cloud adoption is no longer a question of if, it’s how well you manage what’s already in place. In 2025, fine‑tuned control over your cloud... Read more

Automation The Neural Link | Edition 10

Welcome to the latest edition of The Neural Link! From Europe’s new AI champion and Google’s latest Gemini upgrade to GPT-5 backlash and a worrying... Read more

Automation What agentic AI means for Microsoft Copilot users

AI is evolving fast, and Microsoft 365 Copilot is leading the way. While most users are still learning how to prompt effectively, a new wave of... Read more

IT & Cloud Compliance without breaking the budget: A guide for SMBs in financial services

The regulatory landscape for financial services is tightening and it’s not just the big players under scrutiny. Small and mid-sized firms are now... Read more

Cyber Security What is Phishing? Definition, types of attacks & more

Phishing is one of the oldest and most persistent forms of cyber attack and in 2025, it’s more convincing and dangerous than ever. At its core,... Read more

Our Team 5 minutes with Jake Cleland

Meet Jake Cleland - Security Consultant at The Missing Link At The Missing Link, our people are at the heart of everything we do. Their expertise and... Read more