Topic: supply chain risk
- 
Global Data Breach Risk Soars from Indian Suppliers
Over half of key Indian suppliers experienced a third-party breach in the last year, posing risks to global businesses in sectors like semiconductors and pharmaceuticals. Outsourced IT and managed service providers were responsible for nearly two-thirds of breaches, with network security flaws an...
Read More » - 
Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program
A mature automotive cybersecurity program requires a foundation in established frameworks like ISO, but must go beyond compliance by developing a tailored risk management strategy that addresses unique threats and deploys proactive controls across the enterprise. Comprehensive threat visibility, ...
Read More » - 
BRICKSTORM Returns: Why Your Enterprise Must Boost Cyber Defenses
The BRICKSTORM espionage campaign targets legal, technology, SaaS, and BPO firms to steal intellectual property and sensitive data, requiring immediate cybersecurity reassessment. Its stealthy infiltration of overlooked infrastructure like network appliances and virtualization platforms allows at...
Read More » - 
A New Chapter in Cyber Resilience: The Digital As Usual Roadshow in Sydney and Brisbane
The Digital As Usual: Cybersecurity roadshow in Sydney and Brisbane aimed to shift the conversation about digital threats from a technical issue to a strategic, whole-of-business imperative. The event focused on three key areas: human risk, quantifying cyber risk, and supply chain security.
Read More » - 
Oceania's Tech Pros Brace for AI Risks, Rules, and Resilience
Technology leaders in Australia and New Zealand are prioritizing AI risks, sophisticated cyber threats, and regulatory demands for 2026, amid workforce shortages and rapid technological change. Generative AI and large language models are the dominant technology trend, yet only 8% of organizations...
Read More » - 
Cybersecurity's Triple Threat: AI, Quantum, Geopolitics
Geopolitical tensions and emerging threats are elevating cybersecurity to a top strategic priority, prompting organizations to reassess infrastructure and partnerships. Despite increased budgets and AI investments, low confidence in resilience persists due to legacy systems, reactive spending, an...
Read More » - 
Putting NICE Guidelines into Practice: Training Insights
SMBs can effectively train employees against cyber threats by focusing on a streamlined, scenario-based program derived from the NICE Framework, targeting the most common attacks like phishing, malware, and web-based threats. The training integrates technical skills with legal knowledge through r...
Read More » - 
Tech Manufacturer Data I/O Struck by Ransomware Attack
Data I/O, a U.S. technology manufacturer, experienced a ransomware attack on August 16, disrupting critical operations including communications, shipping, and production. The company has partially restored some functions but has not provided a timeline for full recovery, and the attack's financia...
Read More » - 
Avetta Study: Australia's High-Risk Industries Have False Safety Confidence
A major gap exists between Australian workers' feeling of safety (90% feel safe) and actual safety measures, with over half reporting only partial or non-existent safety systems, creating a false sense of security. The study highlights vulnerabilities among contractors, with 65% lacking confidenc...
Read More »