Cyber Security CISO Sydney 2026: Five shifts defining security strategy

Security strategy is entering a more disciplined phase as AI adoption, identity sprawl and regulatory pressure move from emerging considerations to... Read more

Cyber Security Red Teaming vs. Penetration Testing: Why Both Matter for Cyber Security

Cyber security conversations often begin with a straightforward question: How secure are we? For many organisations, the answer starts with a... Read more

Cyber Security What is Phishing? Definition, types of attacks & more

Phishing is one of the oldest and most persistent forms of cyber attack, and in 2026, it’s more convincing and dangerous than ever. Despite decades... Read more

Cyber Security The cost of non compliance: What happens when businesses get it wrong

Regulatory fines make headlines. The real damage often happens quietly. Read more

Cyber Security Do you believe what you see? How deepfakes are reshaping cyber threats

Deepfakes were once treated as internet tricks or political stunts. Today, they pose a serious cyber security threat. Organisations are increasingly... Read more

Cyber Security A day in the life: Security Consulting Team

Penetration testing and application security often get oversimplified. People think it's all about breaking in, grabbing data, writing a report, and... Read more

Cyber Security Cyber Security in 2025: Predictions vs. Reality

Earlier this year, our Security Account Director, Thomas Naylor, shared a set of bold cyber security predictions for 2025. Some broke new ground,... Read more

Cyber Security The risky world of malicious AI

AI is changing how businesses work. It enhances productivity, accelerates decision-making, and automates repetitive tasks. But it also introduces new... Read more

Cyber Security Highlights from Cloudflare Global Connect 2025

I recently had the honour of representing The Missing Link at Cloudflare’s Global Connect event in Las Vegas. From the outset, the energy,... Read more

Cyber Security What is a zero-day attack and how can I protect my business?

Zero-day vulnerabilities are the cyber security equivalent of a trapdoor. You don’t know it exists until it has already been triggered. By then,... Read more

Cyber Security Who are you relying on for your cloud security?

With cloud adoption at an all-time high and hybrid work here to stay, your data is no longer tucked neatly behind the perimeter of a corporate... Read more

Cyber Security Building a future-ready security stack for the quantum era

Encryption that was once considered unbreakable is now on borrowed time. Quantum computing is moving closer to commercial reality, and when it... Read more