Gemma Crawford

July Cyber News Monthly Wrap-up: Key Threats & Trends Impacting Australian Enterprises

JULY NEWS WRAP-UP Australia’s cyber landscape didn’t take a winter break this July. Cybersecurity isn’t just a technical discipline it’s a constant battle against evolving threats, shifting regulations, and unpredictable adversaries. July 2025 was no exception. The past month delivered a mix of headline-grabbing breaches, stealthy malware tactics, and regulatory moves that could reshape how Australian […]

July Cyber News Monthly Wrap-up: Key Threats & Trends Impacting Australian Enterprises Read More »

The Genea Breach: A Wake-Up Call for Australia’s Cyber Security Standards

The Genea Breach: A Wake-Up Call for Australia’s Cybersecurity Standards In February 2025, Genea Fertility, one of Australia’s leading reproductive health providers, suffered a catastrophic data breach. The Termite ransomware group exposed nearly 1TB of sensitive data across 27 servers, exposing thousands of patients’ personal and medical information. This included Medicare numbers, health insurance details,

The Genea Breach: A Wake-Up Call for Australia’s Cyber Security Standards Read More »

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security Why Cyber Asset Management Matters More Than Ever In today’s hyper-connected business environment, every organisation, regardless of size or industry, relies on a growing ecosystem of digital assets. From cloud workloads and IoT devices to user accounts and third-party integrations, these assets are the backbone

Cyber Asset Management: The Hidden Challenge in Modern Cyber Security Read More »

Cyber Security in M&A: What CISO Must Know to Secure the Deal

Cyber Security in M&A: What CISO Must Know to Secure the Deal As mergers and acquisitions (M&A) accelerate across sectors, Cyber Security has taken centre stage in deal negotiations. It is no longer a technical afterthought but a strategic imperative that can make or break a transaction. For Chief Information Officers (CIOs), the stakes have

Cyber Security in M&A: What CISO Must Know to Secure the Deal Read More »

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack In a groundbreaking move, Google’s AI agent Big Sleep intercepted a critical zero-day vulnerability CVE-2025-6965 before it could be exploited. This proactive detection, targeting the widely used SQLite database, marks a pivotal shift in AI-powered cybersecurity. Unlike traditional methods like fuzzing, big Sleep leverages deep contextual analysis to

AI-Powered Cybersecurity: How Google’s Big Sleep Prevented a Zero-Day Attack Read More »

June Cyber News Monthly Wrap-up

June Cyber News Monthly Wrap-up As FY25 kicks off, Australian cybersecurity leaders are facing a rapidly evolving threat landscape. From regulatory enforcement to critical infrastructure vulnerabilities, June’s cyber headlines underscore the urgent need for proactive security strategies. This month’s wrap-up highlights five of the most impactful stories from June 2025 that every CIO, CSO, and

June Cyber News Monthly Wrap-up Read More »

What CIOs Should Ask Their MSSP in FY25 Planning

WHAT CIOS SHOULD ASK THEIR MSSP IN FY25 PLANNING As Australian enterprises enter FY25, cyber security is no longer just a technical function it’s a board-level priority. With threat actors growing more sophisticated and regulatory pressures mounting, CIOs and CSOs must critically assess whether their Managed Security Service Provider (MSSP) is equipped to meet the

What CIOs Should Ask Their MSSP in FY25 Planning Read More »

Australian SME Achieves ISO 27001 Certification with MSSP Support

CASE STUDY SPOTLIGHT: FROM COMPLIANCE GAPS TO ISO CERTIFICATION The Challenge: Compliance Gaps Threaten Business Continuity When a Sydney based financial and legal consulting firm approached their annual cyber insurance renewal, they were met with a harsh reality: Their premium had doubled. The insurer flagged multiple compliance deficiencies. They lacked a centralised incident response plan,

Australian SME Achieves ISO 27001 Certification with MSSP Support Read More »

How Shadow IT and SaaS Sprawl Expose Your Business to Cyber Risk

SHADOW IT & SAAS SPRAWL: HIDDEN RISKS IN YOUR CLOUD ENVIRONMENT You can’t protect what you can’t see. In today’s fast-moving digital workplace, employees regularly adopt tools like file-sharing platforms, chat apps, and design software without IT oversight. This phenomenon, shadow IT is quietly spreading like wildfire through Australian businesses. In fact, Gartner reports that

How Shadow IT and SaaS Sprawl Expose Your Business to Cyber Risk Read More »

ENCRYPTION 2.0: PREPARING FOR POST-QUANTUM SECURITY STANDARDS

ENCRYPTION 2.0: PREPARING FOR POST-QUANTUM SECURITY STANDARDS Quantum computing isn’t science fiction anymore, it’s knocking at the door of today’s encryption. Global security agencies and tech giants are racing to prepare for the impact, and the question facing Australian CIOs and CSOs is: Are we ready for the quantum shift? Modern encryption methods, like RSA

ENCRYPTION 2.0: PREPARING FOR POST-QUANTUM SECURITY STANDARDS Read More »