At the CISO Critical Infrastructure Melbourne conference, similar themes emerged across multiple sessions. Organisations are investing in security,... Read more
LLMs have expanded what’s possible in web application development. As adoption grows, so does the risk of deploying them insecurely. Read more
I recently had my CVE (CVE-2026-21229) published by Microsoft after disclosing a chain that ends in remote code execution (RCE) affecting both... Read more
Cyber threats in Australia are increasing in frequency and complexity. The Australian Cyber Security Centre (ACSC) reports a sharp rise in... Read more
Security strategy is entering a more disciplined phase as AI adoption, identity sprawl and regulatory pressure move from emerging considerations to... Read more
Cyber security conversations often begin with a straightforward question: How secure are we? For many organisations, the answer starts with a... Read more
Phishing is one of the oldest and most persistent forms of cyber attack, and in 2026, it’s more convincing and dangerous than ever. Despite decades... Read more
Regulatory fines make headlines. The real damage often happens quietly. Read more
Deepfakes were once treated as internet tricks or political stunts. Today, they pose a serious cyber security threat. Organisations are increasingly... Read more
Penetration testing and application security often get oversimplified. People think it's all about breaking in, grabbing data, writing a report, and... Read more
Earlier this year, our Security Account Director, Thomas Naylor, shared a set of bold cyber security predictions for 2025. Some broke new ground,... Read more
AI is changing how businesses work. It enhances productivity, accelerates decision-making, and automates repetitive tasks. But it also introduces new... Read more