Cyber Security 5 lessons from CISO Critical Infrastructure Melbourne

At the CISO Critical Infrastructure Melbourne conference, similar themes emerged across multiple sessions. Organisations are investing in security,... Read more

Cyber Security Top AI security vulnerabilities in 2026 and how to mitigate them

LLMs have expanded what’s possible in web application development. As adoption grows, so does the risk of deploying them insecurely. Read more

Cyber Security Microsoft Power BI CVE-2026-21229: How a comment led to RCE

I recently had my CVE (CVE-2026-21229) published by Microsoft after disclosing a chain that ends in remote code execution (RCE) affecting both... Read more

Cyber Security CORIE Framework Explained: How Red Teaming Tests Cyber Resilience

Cyber threats in Australia are increasing in frequency and complexity. The Australian Cyber Security Centre (ACSC) reports a sharp rise in... Read more

Cyber Security CISO Sydney 2026: Five shifts defining security strategy

Security strategy is entering a more disciplined phase as AI adoption, identity sprawl and regulatory pressure move from emerging considerations to... Read more

Cyber Security Red Teaming vs. Penetration Testing: Why Both Matter for Cyber Security

Cyber security conversations often begin with a straightforward question: How secure are we? For many organisations, the answer starts with a... Read more

Cyber Security What is Phishing? Definition, types of attacks & more

Phishing is one of the oldest and most persistent forms of cyber attack, and in 2026, it’s more convincing and dangerous than ever. Despite decades... Read more

Cyber Security The cost of non compliance: What happens when businesses get it wrong

Regulatory fines make headlines. The real damage often happens quietly. Read more

Cyber Security Do you believe what you see? How deepfakes are reshaping cyber threats

Deepfakes were once treated as internet tricks or political stunts. Today, they pose a serious cyber security threat. Organisations are increasingly... Read more

Cyber Security A day in the life: Security Consulting Team

Penetration testing and application security often get oversimplified. People think it's all about breaking in, grabbing data, writing a report, and... Read more

Cyber Security Cyber Security in 2025: Predictions vs. Reality

Earlier this year, our Security Account Director, Thomas Naylor, shared a set of bold cyber security predictions for 2025. Some broke new ground,... Read more

Cyber Security The risky world of malicious AI

AI is changing how businesses work. It enhances productivity, accelerates decision-making, and automates repetitive tasks. But it also introduces new... Read more