Powered by MOMENTUMMEDIA
For breaking news and daily updates,
subscribe to our newsletter.
Explore
SECTIONS
MORE
Thomas Fikentscher of CyberArk explains why organisations should diversify their cyber security strategy.
Thomas Fikentscher • Mon, 07 Jul 2025
New data breach targets Telstra employees
The names and emails of thousands of current and former Telstra employees have been uploaded to the dark web.
• Tue, 04 Oct 2022
How Aussies can avoid identity theft amid Optus data breach fallout
The massive Optus data breach has put current and former customers at risk of becoming identity theft victims, with Norton warning that cyber criminals can leverage the ...
• Fri, 30 Sep 2022
Staying ahead in a compounding threat landscape
Daniel dos Santos from Forescout Technologies explains why organisations must look beyond traditional strategies to secure infrastructure from emerging cyber threats.
Daniel dos Santos • Tue, 27 Sep 2022
SPECIAL EPISODE: Millions of Australians at risk of identity theft from Optus hack
In this special episode of the Cyber Security Uncut podcast, Major General (Ret'd) Marcus Thompson, inaugural head of the ADF's Information Warfare Division and Phil ...
Robyn Tongol • Mon, 26 Sep 2022
Barracuda bolsters XDR offering
The cloud security solutions company has evolved its XDR suite, announcing a raft of new additions to the offering.
• Mon, 19 Sep 2022
Malicious apps identified on Google Play
Dozens of apps on the Google Play platform have been flagged as malicious following a real-time, behaviour-based investigation.
• Thu, 18 Aug 2022
Turbulence ahead: The importance of keeping cyber on your radar
Murray Goldschmidt from CyberCX highlights the need for greater awareness of emerging cyber risks across the aviation sector.
Murray Goldschmidt • Tue, 09 Aug 2022
Why we need to quantum-proof embedded systems now
Opinion: Jim Alfred of BlackBerry Technology Solutions explains how quantum computing can be leveraged to bolster supply chain resilience.
Jim Alfred • Wed, 20 Jul 2022
Is Australia finally coming to grips with the cyber threat?
Has the nation’s response to the cyber security challenge been adequate or has it fallen short? Jason Duerden from SentinelOne explores.
Jason Duerden • Tue, 19 Jul 2022
AWS Marketplace to carry BeyondTrust identity and access solutions
BeyondTrust has announced the availability of all of its solutions for customer purchase in AWS Marketplace.
• Fri, 15 Jul 2022
Why effective machine identity management requires automation
Of all the components required for a complex IT infrastructure to function properly, some of the most important are machine identities, Kevin Bocek, chief security ...
Kevin Bocek • Wed, 15 Jun 2022
Newest cyber threat ‘INCONTROLLER’ targets critical infrastructure
New cyber threat capabilities are leaving critical infrastructure vulnerable to increasingly disruptive attacks. Diego Betancur from Nozomi Networks explores.
Diego Betancur • Thu, 09 Jun 2022