Australia’s Digital Destiny: Leading the Charge for Online Freedom

Introduction In today’s interconnected world, the importance of digital rights cannot be overstated. While the European Union is making commendable strides in this arena, Australia stands at a pivotal juncture to assert its leadership in championing online freedom. The nation’s commitment to democratic values, coupled with a robust technological infrastructure, uniquely positions it to influence […]

Cyber (In)Securities – Issue 123

CyAN

Information Security News: Federal Judge Tightens DOGE Leash Over Critical Treasury Payment System AccessThe Register by Brandon Vigliarolo and Jessica LyonA federal judge has mandated stricter regulatory oversight on the integration of Dogecoin (DOGE) within the U.S. Treasury’s critical payment systems, following concerns about the cryptocurrency’s potential to disrupt financial stability. This decision introduces a […]

Welcome New Member – Osama Soliman from UAE

Please welcome our newest member from UAE, Osama Soliman! Osama Soliman is a seasoned GRC professional with extensive experience in risk management, internal controls, and regulatory compliance. He currently leads the Risk & Control function at a leading online food delivery platform, overseeing GRC activities across multiple markets, including Enterprise Risk Management (ERM), Technology Risk […]

Cyber (In)Securities – Issue 122

CyAN

Information Security News: TSA’s Airport Facial-Recog Tech Faces Audit ProbeThe Register by Brandon VigliaroloThe U.S. Transportation Security Administration’s (TSA) facial recognition program is under audit by the Government Accountability Office (GAO) due to concerns over privacy, data security, and potential biases. The audit will assess how biometric data is collected, stored, and shared, and whether […]

Identity: The New Perimeter for Organisational Cybersecurity in the Age of Competitive AI

In today’s hyper-connected, rapidly evolving digital landscape, traditional cybersecurity paradigms no longer suffice. The perimeter-based approach, which relied on securing the network boundary, has become obsolete as organizations increasingly adopt cloud computing, remote work, and AI-driven tools. The competitive nature of artificial intelligence (AI) further intensifies this shift, as both attackers and defenders leverage AI […]

Cyber (In)Securities – Issue 120

CyAN

Information Security News US freezes foreign aid, halting cybersecurity defence and policy funds for alliesThe Register by Jessica LyonsRead more here The U.S. government has frozen foreign aid, including funds allocated to support allies’ cybersecurity defense and policy initiatives. This unexpected move could leave critical infrastructure in allied nations vulnerable, as many rely on U.S. […]

Cyber (In)Securities – Issue 119

CyAN

Information Security News Google Cloud Links Poor Credentials to Nearly Half of All Cloud-Based AttacksBy Matt Kapko, Cybersecurity DiveRead moreGoogle Cloud has reported that nearly half of all cloud-based cyberattacks can be traced back to weak or compromised credentials. Attackers frequently exploit poor password hygiene and misconfigured access controls to infiltrate cloud environments, leading to […]

A Day in the Life of a Seasoned Security Analyst: Transforming Cybersecurity with 360Sequrity Solutions By Shantanu Bhattacharya

CyAN

Let me take you on a journey through the eyes of Alex, a seasoned security analyst at SecureBank, a global financial institution. Alex’s team is responsible for protecting sensitive customer data from increasingly sophisticated cyberattacks. Every day is a battle, but this one is about to be different. The Old Normal: A Day of Chaos […]