Cyberattacks on any critical infrastructure should be alarming, but attacks on nuclear infrastructure are all the more so due to the potential consequences, including radiation leaks. A China-sponsored hacker attacked the US National Nuclear Security …
While cybersecurity professionals often focus on firewalls, encryption and software vulnerabilities, the real battleground is human psychology. While organisations remain fixated on digital defences, humans are the most reliable vulnerability in any system. That’s why …
Australia must strike a better balance between independent control over its defence-industrial supply chains and staying open to global innovation, particularly in dual-use technologies. As strategic competition intensifies, rigid restrictions can stifle the very innovation …
While headlines warn about the risks of dodgy e-commerce and questionable supply chains, a quieter vulnerability has taken root in our digital infrastructure. In May, researchers at GreyNoise uncovered a stealthy backdoor campaign targeting Asus …
In April, more than 50 chief information security officers called on G7 and OECD member states to address the growing divergence in cybersecurity regulatory requirements. Rules are increasingly varying from country to country and even …




