Cyber Security A day in the life: Security Consulting Team

Penetration testing and application security often get oversimplified. People think it's all about breaking in, grabbing data, writing a report, and... Read more

Cyber Security Cyber Security in 2025: Predictions vs. Reality

Earlier this year, our Security Account Director, Thomas Naylor, shared a set of bold cyber security predictions for 2025. Some broke new ground,... Read more

Cyber Security The risky world of malicious AI

AI is changing how businesses work. It enhances productivity, accelerates decision-making, and automates repetitive tasks. But it also introduces new... Read more

Cyber Security Highlights from Cloudflare Global Connect 2025

I recently had the honour of representing The Missing Link at Cloudflare’s Global Connect event in Las Vegas. From the outset, the energy,... Read more

Cyber Security What is a zero-day attack and how can I protect my business?

Zero-day vulnerabilities are the cyber security equivalent of a trapdoor. You don’t know it exists until it has already been triggered. By then,... Read more

Cyber Security Who are you relying on for your cloud security?

With cloud adoption at an all-time high and hybrid work here to stay, your data is no longer tucked neatly behind the perimeter of a corporate... Read more

Cyber Security Building a future-ready security stack for the quantum era

Encryption that was once considered unbreakable is now on borrowed time. Quantum computing is moving closer to commercial reality, and when it... Read more

Cyber Security How secure is your supply chain, really?

You’ve secured your internal environment. Your defences are strong, and your teams are trained. But what about the vendors and partners who handle... Read more

Cyber Security The unseen battle: Why you need secure coding now more than ever

Data breaches, financial losses, and public scandals - they’re all over the news. And behind each story is a question few people think to ask: Why do... Read more

Cyber Security Building a Cyber-Ready Culture Means Letting Go of Legacy IT

Every business depends on technology, but what happens when the systems you trust most quietly stop protecting you? Legacy IT can appear stable, but... Read more

Cyber Security Horizon 2 of Australia’s cyber security strategy: What to do before 2026

If you lead risk, technology, or security, Horizon 2 is your signal to scale. The Australian Cyber Security Strategy 2023–2030 moves into its second... Read more

Cyber Security Cyber hygiene starts with visibility: Tackling today’s top cyber threats

In cybersecurity, we often talk about good habits: enabling multi-factor authentication, patching systems regularly, and training staff to spot... Read more