Anthropic's Claude Mythos: how can security leaders prepare?
07 May, 2026 by Melissa Bischoping, Head of Threat Research & Intelligence, Tanium | Supplied by: TaniumAdvanced exploit development is no longer an artisan craft performed by seasoned experts with deep expertise. Now virtually anyone can do it faster and cheaper.
Palo Alto to acquire Portkey to help secure AI agents
07 May, 2026 by Dylan Bushell-EmblingPalo Alto Networks has revealed plans to acquire AI gateway company Portkey and incorporate the solution into its Prisma AI Runtime Security platform.
Delayed detection is turning cyber incidents into million-dollar losses
05 May, 2026 by Raghu Nandakumara, Vice President of Industry Strategy, Illumio | Supplied by: IllumioDespite record spending on cybersecurity, the volume of successful breaches continues to rise.
ACSC issues High Status alert for Cisco Firepower and Secure Firewall products
24 April, 2026A previously unknown persistence mechanism has been discovered, which is preserved across, even when upgrading, on Cisco Firepower and Secure Firewall products.
AI adoption is accelerating, but is cybersecurity keeping up?
23 April, 2026 by Nick Schneider, President & CEO, Arctic Wolf | Supplied by: Arctic WolfToday, AI tools are being adopted faster than most organisations can secure them.
Entrust enhances platform to support stage 2 AML laws
22 April, 2026 by Dylan Bushell-Embling | Supplied by: Entrust International LLC (Australia)Entrust has enhanced its identity security platform to support phase 2 of Australia's Anti-Money Laundering and Counter-Terrorism Financing regime.
Harvest now, decrypt later: why your encrypted data has an expiry date
21 April, 2026 by Mahesh Krishnan, Chief Technology Officer for Oceania at Fujitsu | Supplied by: Fujitsu AustraliaQuantum communications represent a rare type of disruption: one that is both predictable and already in motion.
Supply chains are growing faster than their security
16 April, 2026 by Kash Sharma, Managing Director ANZ, BlueVoyant | Supplied by: BlueVoyantMore third parties mean more entry points, more dependencies and more opportunities for adversaries to find the weakest link in the chain.
KnowBe4 launches Agent Risk Manager
16 April, 2026 by Dylan Bushell-Embling | Supplied by: KnowBe4KnowBe4's Agent Risk Manager solution is designed to help IT teams secure, monitor and govern the behaviour of AI agents.
Identity at the edge
13 April, 2026 by Dr. Kawin Boonyapredee, APJ CISO Advisor, KnowBe4 | Supplied by: KnowBe4How the sixth annual identity management day highlights the new frontiers of trust.
ACSC warns of ongoing targeting of online code repositories
07 April, 2026The Australian Cyber Security Centre has released a high priority alert regarding the ongoing targeting of online code repositories.
BeyondTrust introduces tools for securing AI agents
26 March, 2026 by Dylan Bushell-Embling | Supplied by: BeyondTrustIdentity security company BeyondTrust has enhanced its Pathfinder Platform with tools designed to improve observability and security of AI agents and workloads.
Why legacy systems have become cybersecurity's least trusted zone
25 March, 2026 by Ben Mudie, Field CTO for APJ at Tenable | Supplied by: Tenable APACLegacy systems are often portrayed as technical problems. However, in practice, they are a serious governance concern.
CrowdStrike and NVIDIA develop secure-by-design AI blueprint
19 March, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrikeCrowdStrike has arranged to integrate its Falcon security platform into the open-source NVIDIA OpenShell run-time for autonomous AI agents.
Unit42 discloses severe flaw in Google's Gemini
13 March, 2026 by Dylan Bushell-Embling | Supplied by: Palo Alto NetworksResearchers from Palo Alto Networks' Unit 42 have detailed their discovery of a high-severity vulnerability in Google's Gemini Live in Chrome AI feature.
