Our Services How to use leftover EOFY IT budget to secure delivery

What should you do with leftover end of financial year (EOFY) IT budget? The most effective way to use leftover EOFY IT budget is to commit it to... Read more

Cyber Security Why your SOC isn’t keeping up with modern threats

A Security Operations Centre (SOC) struggles to keep up with modern threats. Attacks now move much faster and at a greater scale, while most SOCs... Read more

Cyber Security 5 lessons from CISO Critical Infrastructure Melbourne

At the CISO Critical Infrastructure Melbourne conference, similar themes emerged across multiple sessions. Organisations are investing in security,... Read more

Cyber Security Top AI security vulnerabilities in 2026 and how to mitigate them

LLMs have expanded what’s possible in web application development. As adoption grows, so does the risk of deploying them insecurely. Read more

Cyber Security Microsoft Power BI CVE-2026-21229: How a comment led to RCE

I recently had my CVE (CVE-2026-21229) published by Microsoft after disclosing a chain that ends in remote code execution (RCE) affecting both... Read more

Cyber Security CORIE Framework Explained: How Red Teaming Tests Cyber Resilience

Cyber threats in Australia are increasing in frequency and complexity. The Australian Cyber Security Centre (ACSC) reports a sharp rise in... Read more

Cyber Security CISO Sydney 2026: Five shifts defining security strategy

Security strategy is entering a more disciplined phase as AI adoption, identity sprawl and regulatory pressure move from emerging considerations to... Read more

Cyber Security Red Teaming vs. Penetration Testing: Why Both Matter for Cyber Security

Cyber security conversations often begin with a straightforward question: How secure are we? For many organisations, the answer starts with a... Read more

Cyber Security What is Phishing? Definition, types of attacks & more

Phishing is one of the oldest and most persistent forms of cyber attack, and in 2026, it’s more convincing and dangerous than ever. Despite decades... Read more

Cyber Security The cost of non compliance: What happens when businesses get it wrong

Regulatory fines make headlines. The real damage often happens quietly. Read more

Cyber Security Do you believe what you see? How deepfakes are reshaping cyber threats

Deepfakes were once treated as internet tricks or political stunts. Today, they pose a serious cyber security threat. Organisations are increasingly... Read more

Cyber Security A day in the life: Security Consulting Team

Penetration testing and application security often get oversimplified. People think it's all about breaking in, grabbing data, writing a report, and... Read more