Defending Against Cyber Attacks in the Age of AI: 9 Expert Tips from Abdul Alim

As AI-powered cyberattacks grow more sophisticated and frequent, companies are pouring millions into cybersecurity defenses. With over 20 years of experience in the field, cybersecurity expert Abdul Alim shares practical, battle-tested tips for staying secure in the AI era. Key Points Recognise the importance of dedicated cybersecurity teams separate from general IT roles. Be prepared […]

Read More →

The long road to compliance with the positive duty: Why restaurant and hospitality businesses are being singled out

Over two years have passed since the Positive Duty was enacted by the Australian Parliament, compelling employers to eliminate unlawful sexual discrimination. Particularly, the restaurant and hospitality industries are under scrutiny for their compliance with these regulations. This article delves into the challenges faced by these sectors in meeting their obligations and the proactive steps […]

Read More →

Report: Identity Has Become a Critical Security Perimeter for Cloud Services

A new report from Fortinet highlights significant vulnerabilities in cloud services, with identity management emerging as a critical area of concern. The 2025 Global Threat Landscape Report reveals that misconfigurations are no longer the sole focus for attackers, who are exploiting over-permissioned identities and using familiar tactics to infiltrate cloud environments. The report emphasises that […]

Read More →

NASCIO Suggests Training Nonviolent Inmates for Cyber Jobs

The National Association of State Chief Information Officers (NASCIO) has proposed that vocational cybersecurity training for nonviolent offenders could help address the significant cybersecurity talent shortage in the US. The idea is to equip incarcerated individuals with the skills needed to secure employment after their release, thus benefiting both the individuals and the cybersecurity industry. […]

Read More →

US school districts facing extortion attempt after hack, software provider says

Hackers have taken aim at multiple school districts across the United States, attempting to extort them with stolen data from the education software provider PowerSchool. The company, which supports over 60 million students globally, revealed that they previously suffered a data breach, leading to concerns for student privacy. Source: Daily Mail Key Points Multiple US […]

Read More →

Over 19 billion passwords have been leaked in security ‘crisis’ – here’s how to check if yours is vulnerable

The latest report reveals a staggering leak of over 19 billion passwords, prompting urgent discussions about cybersecurity. Experts emphasise the dire need for better security practices and explain how to check if your credentials are at risk. Source: The Independent Key Points 19 billion passwords were leaked in a recent cybersecurity crisis, raising alarms about […]

Read More →

Essential Steps to Building a Strong CVE and Vulnerability Management Strategy

This resource outlines the critical steps necessary to establish a resilient CVE and vulnerability management strategy. It summarises foundational practices, highlights prioritisation methods, and emphasises the importance of continuous monitoring for maintaining robust defensive postures. Building an effective CVE and vulnerability management strategy is foundational for cybersecurity resilience. Organisations need a systematic approach to identify, […]

Read More →