Security

Akamai and Visa collaborating to secure agentic commerce

22 December, 2025 by Dylan Bushell-Embling | Supplied by: Akamai Technologies

Akamai and Visa have formed a strategic partnership aimed at providing security solutions for the emerging world of agentic commerce.


Kyndryl unveils quantum safe assessment service

19 December, 2025 by Dylan Bushell-Embling | Supplied by: Kyndryl Australia

Technology services company Kyndryl's quantum safe assessment service aims to help organisations navigate the transition to post‍-‍quantum cryptography.


Australian orgs the most targeted by ransomware in 2025

10 December, 2025 by Dylan Bushell-Embling | Supplied by: Rubrik Australia Pty Ltd

Australian organisations were the most targeted by ransomware among organisations in 10 markets during the 12 months to September, a report suggests.


How to harness AI to advance cybersecurity

05 December, 2025 by Jamie Humphrey, General Manager, Infrastructure Solutions Group, Dell Technologies, Australia and New Zealand | Supplied by: Dell Technologies

Organisations that prioritise AI‍-‍enabled security and a culture of continuous learning are best positioned to navigate the evolving threat landscape.


Solving the IoT attack surface challenge: a practical playbook for IT managers

01 December, 2025 by Camille Campbell, Director of Wireless WAN and Security Product Marketing, Ericsson Enterprise Wireless Solutions | Supplied by: Ericsson Enterprise Wireless Solutions Australia Pty Ltd

As IoT environments get more complex, adopting zero-trust architectures to verify every device and limit access will become essential.


CrowdStrike says it found a killswitch in DeepSeek

25 November, 2025 by Dylan Bushell-Embling | Supplied by: CrowdStrike

CrowdStrike alleges that Chinese LLM DeepSeek-R1 is more likely to produce insecure code, or refuse to follow prompts, based on political triggers.


Sophos integrates its threat intelligence platform with Copilot

20 November, 2025 by Dylan Bushell-Embling | Supplied by: Sophos Pty Ltd

Sophos has announced the launch of integrations between its Intelix cyberthreat intelligence repository with the Microsoft Copilot ecosystem.


Defending against AI‍-‍powered cyberthreats

19 November, 2025 by Matthew Lowe*

Improving cyber resilience is no longer about perimeter defence or reactive patching, but requires a holistic approach that combines detection, prevention and response.


Lessons from the Land Rover cyber attack: seeing risk before it strikes

13 November, 2025 by Scott Magill, Country Manager ANZ, Tenable | Supplied by: Tenable APAC

The recent Jaguar Land Rover cyber attack saga is a stark demonstration of what happens when cyber visibility fails.


Lakera launches framework for testing LLM security

04 November, 2025 by Dylan Bushell-Embling | Supplied by: Check Point Software Technologies Ltd

Check Point’s Lakera has developed an open-source framework for testing the security of large language models used by AI agents.


Cognizant forges BRaaS alliance with Rubrik

29 October, 2025 by Dylan Bushell-Embling | Supplied by: Cognizant Australia

Cognizant is expanding its partnership with security and AI company Rubrik to develop joint business-resilience-as-a-service offerings.


Why AI agents are a new insider threat for business

28 October, 2025 by Gareth Cox*

AI-powered insiders are non-human actors operating within the perimeter, inheriting trusted credentials and executing commands with perfect legitimacy.


Securing SMB organisations: closing the cyber gap through culture

22 October, 2025 by MJ Robotham, Director, APAC at NinjaOne | Supplied by: NinjaOne Australia

Limited budgets and resources mean SMBs cannot financially prioritise cybersecurity as much as large organisations.


Bitdefender launches endpoint security tool

20 October, 2025 by Dylan Bushell-Embling | Supplied by: Bitdefender

Bitdefender has launched its new GravityZone PHASR pre-emptive endpoint security solution in Australia as a standalone offering.


The silent cyberthreat lurking in mismanaged tokens

10 October, 2025 by Morey Haber* | Supplied by: BeyondTrust

It took years of painful breaches for organisations to recognise the importance of secure password practices, and now tokens require that same cultural shift.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd