Risk Management

February 2026 Cyber Threats Australia: MITRE ATT&CK + Essential Eight

MITRE ATT&CK & ESSENTIAL EIGHT ALIGNMENT Aligning MITRE ATT&CK with the Essential Eight  helps organisations move from generic security activity to targeted risk reduction. MITRE ATT&CK shows how attackers gain access, escalate privileges, and exfiltrate data, while the Essential Eight provides the controls that can directly interrupt those steps. When both are used together, teams […]

February 2026 Cyber Threats Australia: MITRE ATT&CK + Essential Eight Read More »

IRONSCALES Email Security: Adaptive AI, Human Intelligence, Real Defence

Spotlight Feature | Ironscales: Modern Email Security Built For How Attacks Actually Happen Email remains the primary entry point for cyber attacks. Business email compromise, credential harvesting, impersonation, and socially engineered phishing now account for a large share of security incidents across all sectors. IRONSCALES is an email security platform designed specifically to address this

IRONSCALES Email Security: Adaptive AI, Human Intelligence, Real Defence Read More »

Top 3 Cyber Events That Matter in Australia – January 2026

Top 3 Cyber Events That Matter in Australia – January 2026 Australia’s cyber threat environment continues to escalate faster than organisational preparedness. Despite years of warnings, recent data shows that many Australian organisations still struggle with basic cyber hygiene, timely patching, and governance of emerging technologies. Early 2026 has already delivered several incidents that expose

Top 3 Cyber Events That Matter in Australia – January 2026 Read More »

Safe Use of AI in the Workplace

Safe Use of AI in the Workplace What if your team’s next productivity boost also carried hidden risks? As Australian organisations increasingly adopt generative AI tools, the safe use of AI in the workplace is no longer optional, it’s imperative. Missteps with large language models (LLMs) can lead to data exposure, compliance breaches, and reputational

Safe Use of AI in the Workplace Read More »

Safe use of AI in the workplace: secure business-AI collaboration

The Genea Breach: A Wake-Up Call for Australia’s Cyber Security Standards

The Genea Breach: A Wake-Up Call for Australia’s Cybersecurity Standards In February 2025, Genea Fertility, one of Australia’s leading reproductive health providers, suffered a catastrophic data breach. The Termite ransomware group exposed nearly 1TB of sensitive data across 27 servers, exposing thousands of patients’ personal and medical information. This included Medicare numbers, health insurance details,

The Genea Breach: A Wake-Up Call for Australia’s Cyber Security Standards Read More »

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security Why Cyber Asset Management Matters More Than Ever In today’s hyper-connected business environment, every organisation, regardless of size or industry, relies on a growing ecosystem of digital assets. From cloud workloads and IoT devices to user accounts and third-party integrations, these assets are the backbone

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security Read More »

Cyber Security in M&A: What CISO Must Know to Secure the Deal

Cyber Security in M&A: What CISO Must Know to Secure the Deal As mergers and acquisitions (M&A) accelerate across sectors, Cyber Security has taken centre stage in deal negotiations. It is no longer a technical afterthought but a strategic imperative that can make or break a transaction. For Chief Information Officers (CIOs), the stakes have

Cyber Security in M&A: What CISO Must Know to Secure the Deal Read More »

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack In a groundbreaking move, Google’s AI agent Big Sleep intercepted a critical zero-day vulnerability CVE-2025-6965 before it could be exploited. This proactive detection, targeting the widely used SQLite database, marks a pivotal shift in AI-powered cybersecurity. Unlike traditional methods like fuzzing, big Sleep leverages deep contextual analysis to

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack Read More »

June Cyber News Monthly Wrap-up

June Cyber News Monthly Wrap-up As FY25 kicks off, Australian cybersecurity leaders are facing a rapidly evolving threat landscape. From regulatory enforcement to critical infrastructure vulnerabilities, June’s cyber headlines underscore the urgent need for proactive security strategies. This month’s wrap-up highlights five of the most impactful stories from June 2025 that every CIO, CSO, and

June Cyber News Monthly Wrap-up Read More »