News
80% of Aussies organisations face identity attacks, survey finds
6+ hour, 29+ min ago (299+ words) New research has revealed eighty per cent of Australian organisations have been victims of at least one identity breach in the past year. Cyber security company Sophos has released its findings from a new global survey, noting that identity-based cyber…...
Sophos highlights prevalence of identity breaches
19+ hour, 33+ min ago (416+ words) The State of Identity Security 2026 survey by Sophos reveals that 71% of organisations reported at least one identity breach last year, with the energy sector particularly hard hit The highest breach rates were found in energy, oil and gas, and other…...
How to build a HIPAA-compliant CI/CD pipeline: a 2026 implementation guide
10+ hour, 4+ min ago (1669+ words) The architecture, the code, and the parts auditors actually inspect. Most HIPAA CI/CD content describes the controls. This one describes the architecture. A healthcare engineering team I worked with had six weeks to make their CI/CD pipeline audit-ready....
Estia Health drives Zero Trust security overhaul
15+ hour, 13+ min ago (619+ words) Australia's second-largest residential aged care provider Estia Health is using Zero Trust principles to enable "precise, context-aware access" for anyone interacting with its systems or networks. Estia Health supports more than 10, 000 residents annually across nearly 100 aged care homes. Delivering that…...
How to Create Strong Passwords You'll Actually Remember
2+ day, 1+ hour ago (302+ words) Analytics Insight How to Create Strong Passwords You'll Actually Remember Use a Passphrase Instead of a Single Word Short passwords are easy to crack. A passphrase made with random but meaningful words is much safer. Try combining unrelated words with…...
Marks and Spencer Password Reset Call Shows Why Helpdesk Verification Is the New MFA Surface
2+ day, 16+ hour ago (705+ words) Holger Schulze is the founder and publisher of Cybersecurity Insiders, an independent cybersecurity media and research company. The publication centers on the security domains under the most pressure from AI: identity and phishing resistance, incident response velocity, application security, and…...
Zero Trust Architecture Explained for Business Leaders
2+ day, 13+ hour ago (964+ words) Zero Trust Architecture assumes no user or device is safe by default, reducing the spread and impact of cyberattacks through constant verification and limited access. Businesses using Zero Trust face lower breach costs, faster threat detection, and stronger protection across…...
Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens
2+ day, 20+ hour ago (522+ words) Hackers are exploiting a little-known feature of Microsoft's authentication system to steal account credentials at scale. Device code phishing campaigns now target organizations worldwide by manipulating the OAuth device authorization flow, turning a security feature into a major vulnerability. This…...
How Small Teams Are Embracing Zero-Trust Architecture
2+ day, 21+ hour ago (643+ words) In the past, zero-trust security was mainly reserved for large enterprises. They had the budget and the personnel for it'and their data, sensitive as it was, truly needed it." In recent years, however, we're seeing the approach taken up by…...
How Zero Trust Architecture Is Reshaping Smart Home Security
2+ day, 16+ hour ago (453+ words) When an autonomous ROME agent hijacked cloud GPUs during the Alibaba Mixture-of-Experts AI incident, it exposed a brutal truth: traditional perimeter-based firewalls are fundamentally flawed. The breach didn't come from outside. It exploited implicit internal permissions that most networks still…...