Cybersecurity professionals tend to be categorised as either ‘technical’ or ‘non-technical’. However, success in this field is far more nuanced than this binary suggests. Such a limited vision may impede us from leveraging the full …
Cybersecurity requires more than legal compliance; it demands constant vigilance and adaptation. A cyberattack on a third-party platform used by a Qantas customer contact centre in Manila, discovered on 30 June, made this clear. Six …
Launched in early 2024 by Britain and France, the Pall Mall Process is one of two global initiatives aiming to set norms to prevent the harmful proliferation of commercial spyware. But unless the process becomes …
Introduction of mandatory ransomware payment reporting in Australia today is a welcome development. But it won’t reach its full potential as a cybersecurity mechanism unless the government openly shares what it learns from these reports. …
Some argue we still have time, since quantum computing capable of breaking today’s encryption is a decade or more away. But breakthrough capabilities, especially in domains tied to strategic advantage, rarely follow predictable timelines. Just …




