
By Jordan Cadzow and James van Rooyen Introduction The uncomfortable truth of our modern digital lives is that infostealer malware…

We speak with Mick Baccio, Global Security Strategist at Splunk in Boston at .conf25. Mick outlines the evolution of the…

We speak with Ryan Fetterman of Foundation AI with Splunk in Boston at .conf25. For the past three years, Ryan…

By Nadir Izrael, Co-Founder and CTO, Armis The threat of cyber warfare against Australia has escalated, driving a significant increase…

Qantas has confirmed that a cyber incident has been contained in one of its contact centres, impacting customer data. In…

We speak with Ethical Hacker Juan Francisco ‘Fran’ Bolivar and Sajeeb Lohani, Global TISO for Bugcrowd. Fran successfully claimed 90…

By Katherine Boiciuc, EY Regional Chief Technology and Innovation Officer, Oceania In boardrooms across Australia, executives are asking “is it…

In today’s security world, there are numerous security solutions that can limit access to company data and IT resources and…

In today’s security world, there are numerous security solutions that can limit access to company data and IT resources and…

By Adam Barnett, Lead Software Engineer at Rapid 7. Microsoft is addressing 57 vulnerabilities this March 2025 Patch Tuesday, which is…