Akamai and Visa collaborating to secure agentic commerce
22 December, 2025 by Dylan Bushell-Embling | Supplied by: Akamai TechnologiesAkamai and Visa have formed a strategic partnership aimed at providing security solutions for the emerging world of agentic commerce.
Kyndryl unveils quantum safe assessment service
19 December, 2025 by Dylan Bushell-Embling | Supplied by: Kyndryl AustraliaTechnology services company Kyndryl's quantum safe assessment service aims to help organisations navigate the transition to post-quantum cryptography.
Australian orgs the most targeted by ransomware in 2025
10 December, 2025 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty LtdAustralian organisations were the most targeted by ransomware among organisations in 10 markets during the 12 months to September, a report suggests.
How to harness AI to advance cybersecurity
05 December, 2025 by Jamie Humphrey, General Manager, Infrastructure Solutions Group, Dell Technologies, Australia and New Zealand | Supplied by: Dell TechnologiesOrganisations that prioritise AI-enabled security and a culture of continuous learning are best positioned to navigate the evolving threat landscape.
Solving the IoT attack surface challenge: a practical playbook for IT managers
01 December, 2025 by Camille Campbell, Director of Wireless WAN and Security Product Marketing, Ericsson Enterprise Wireless Solutions | Supplied by: Ericsson Enterprise Wireless Solutions Australia Pty LtdAs IoT environments get more complex, adopting zero-trust architectures to verify every device and limit access will become essential.
CrowdStrike says it found a killswitch in DeepSeek
25 November, 2025 by Dylan Bushell-Embling | Supplied by: CrowdStrikeCrowdStrike alleges that Chinese LLM DeepSeek-R1 is more likely to produce insecure code, or refuse to follow prompts, based on political triggers.
Sophos integrates its threat intelligence platform with Copilot
20 November, 2025 by Dylan Bushell-Embling | Supplied by: Sophos Pty LtdSophos has announced the launch of integrations between its Intelix cyberthreat intelligence repository with the Microsoft Copilot ecosystem.
Defending against AI-powered cyberthreats
19 November, 2025 by Matthew Lowe*Improving cyber resilience is no longer about perimeter defence or reactive patching, but requires a holistic approach that combines detection, prevention and response.
Lessons from the Land Rover cyber attack: seeing risk before it strikes
13 November, 2025 by Scott Magill, Country Manager ANZ, Tenable | Supplied by: Tenable APACThe recent Jaguar Land Rover cyber attack saga is a stark demonstration of what happens when cyber visibility fails.
Lakera launches framework for testing LLM security
04 November, 2025 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies LtdCheck Point’s Lakera has developed an open-source framework for testing the security of large language models used by AI agents.
Cognizant forges BRaaS alliance with Rubrik
29 October, 2025 by Dylan Bushell-Embling | Supplied by: Cognizant AustraliaCognizant is expanding its partnership with security and AI company Rubrik to develop joint business-resilience-as-a-service offerings.
Why AI agents are a new insider threat for business
28 October, 2025 by Gareth Cox*AI-powered insiders are non-human actors operating within the perimeter, inheriting trusted credentials and executing commands with perfect legitimacy.
Securing SMB organisations: closing the cyber gap through culture
22 October, 2025 by MJ Robotham, Director, APAC at NinjaOne | Supplied by: NinjaOne AustraliaLimited budgets and resources mean SMBs cannot financially prioritise cybersecurity as much as large organisations.
Bitdefender launches endpoint security tool
20 October, 2025 by Dylan Bushell-Embling | Supplied by: BitdefenderBitdefender has launched its new GravityZone PHASR pre-emptive endpoint security solution in Australia as a standalone offering.
The silent cyberthreat lurking in mismanaged tokens
10 October, 2025 by Morey Haber* | Supplied by: BeyondTrustIt took years of painful breaches for organisations to recognise the importance of secure password practices, and now tokens require that same cultural shift.
