Security

Anthropic's Claude Mythos: how can security leaders prepare?

07 May, 2026 by Melissa Bischoping, Head of Threat Research & Intelligence, Tanium | Supplied by: Tanium

Advanced exploit development is no longer an artisan craft performed by seasoned experts with deep expertise. Now virtually anyone can do it faster and cheaper.


Palo Alto to acquire Portkey to help secure AI agents

07 May, 2026 by Dylan Bushell-Embling

Palo Alto Networks has revealed plans to acquire AI gateway company Portkey and incorporate the solution into its Prisma AI Runtime Security platform.


Delayed detection is turning cyber incidents into million‍-‍dollar losses

05 May, 2026 by Raghu Nandakumara, Vice President of Industry Strategy, Illumio | Supplied by: Illumio

Despite record spending on cybersecurity, the volume of successful breaches continues to rise.


ACSC issues High Status alert for Cisco Firepower and Secure Firewall products

24 April, 2026

A previously unknown persistence mechanism has been discovered, which is preserved across, even when upgrading, on Cisco Firepower and Secure Firewall products.


AI adoption is accelerating, but is cybersecurity keeping up?

23 April, 2026 by Nick Schneider, President & CEO, Arctic Wolf | Supplied by: Arctic Wolf

Today, AI tools are being adopted faster than most organisations can secure them.


Entrust enhances platform to support stage 2 AML laws

22 April, 2026 by Dylan Bushell-Embling | Supplied by: Entrust International LLC (Australia)

Entrust has enhanced its identity security platform to support phase 2 of Australia's Anti-Money Laundering and Counter-Terrorism Financing regime.


Harvest now, decrypt later: why your encrypted data has an expiry date

21 April, 2026 by Mahesh Krishnan, Chief Technology Officer for Oceania at Fujitsu | Supplied by: Fujitsu Australia

Quantum communications represent a rare type of disruption: one that is both predictable and already in motion.


Supply chains are growing faster than their security

16 April, 2026 by Kash Sharma, Managing Director ANZ, BlueVoyant | Supplied by: BlueVoyant

More third parties mean more entry points, more dependencies and more opportunities for adversaries to find the weakest link in the chain.


KnowBe4 launches Agent Risk Manager

16 April, 2026 by Dylan Bushell-Embling | Supplied by: KnowBe4

KnowBe4's Agent Risk Manager solution is designed to help IT teams secure, monitor and govern the behaviour of AI agents.


Identity at the edge

13 April, 2026 by Dr. Kawin Boonyapredee, APJ CISO Advisor, KnowBe4 | Supplied by: KnowBe4

How the sixth annual identity management day highlights the new frontiers of trust.


ACSC warns of ongoing targeting of online code repositories

07 April, 2026

The Australian Cyber Security Centre has released a high priority alert regarding the ongoing targeting of online code repositories.


BeyondTrust introduces tools for securing AI agents

26 March, 2026 by Dylan Bushell-Embling | Supplied by: BeyondTrust

Identity security company BeyondTrust has enhanced its Pathfinder Platform with tools designed to improve observability and security of AI agents and workloads.


Why legacy systems have become cybersecurity's least trusted zone

25 March, 2026 by Ben Mudie, Field CTO for APJ at Tenable | Supplied by: Tenable APAC

Legacy systems are often portrayed as technical problems. However, in practice, they are a serious governance concern.


CrowdStrike and NVIDIA develop secure-by-design AI blueprint

19 March, 2026 by Dylan Bushell-Embling | Supplied by: CrowdStrike

CrowdStrike has arranged to integrate its Falcon security platform into the open-source NVIDIA OpenShell run-time for autonomous AI agents.


Unit42 discloses severe flaw in Google's Gemini

13 March, 2026 by Dylan Bushell-Embling | Supplied by: Palo Alto Networks

Researchers from Palo Alto Networks' Unit 42 have detailed their discovery of a high‍-‍severity vulnerability in Google's Gemini Live in Chrome AI feature.


  • All content Copyright © 2026 Westwick-Farrow Pty Ltd