TechDay Australia - Australia's technology news network

Security Posture stories - Page 12

Unnamed  3 (2)

UK bill accelerates shift to offensive cyber security

Sat, 24th Jan 2026
#
firewalls
#
endpoint protection
#
devops
New UK cyber bill pushes critical sectors towards continuous offensive security testing as state-backed and criminal threats intensify.
Cinematic us soc ai brain highlighting critical network threats

Check Point unveils AI-ready continuous exposure management

Sat, 24th Jan 2026
#
firewalls
#
network security
#
cloud security
Check Point launches AI-ready Exposure Management to plug remediation gaps, unifying threat intelligence, prioritisation and automated fixes.
Image

SonicWall pushes unified automation for faster cyber defence

Fri, 23rd Jan 2026
#
malware
#
firewalls
#
ransomware
SonicWall launches unified automation tools to cut alert fatigue, speed cyber threat remediation and streamline overstretched security teams.
Secure hybrid cloud identity protection rapid enterprise recovery

Cohesity boosts identity resilience for hybrid AD, Entra

Fri, 23rd Jan 2026
#
data protection
#
dr
#
ransomware
Cohesity has expanded its Identity Resilience tools to detect, block and rapidly undo attacks on hybrid Active Directory and Entra ID.
Cinematic datacenter cloud api security shield real time threat

Radware unveils cloud service for unified API security

Fri, 23rd Jan 2026
#
firewalls
#
hybrid cloud
#
digital transformation
Radware launches cloud-based API Security Service unifying discovery, posture management and runtime defence to counter evolving API threats.
Nighttime corporate office saas breach server alerts costs

AppOmni study pegs average SaaS breach at USD $1.365m

Fri, 23rd Jan 2026
#
saas
#
digital transformation
#
cloud security
AppOmni study finds average SaaS breach costs USD $1.365m, as customers report big time savings, fewer audit issues and faster detection.
Vincent hwang

AI surge exposes cloud security gaps, report warns

Fri, 23rd Jan 2026
#
saas
#
firewalls
#
data protection
New global survey warns a widening 'complexity gap' leaves AI-driven, multi-cloud environments outpacing organisations' security defences.
Tangled rusty circuit padlock over cloud servers outdated security

Legacy PKI blamed for outages & rising security risk

Thu, 22nd Jan 2026
#
encryption
#
cloud security
#
iam
Legacy PKI and manual certificate management are driving outages and security exploits as machine identities surge, CyberArk research warns.
Modern soc security ops center mdr unified cloud monitoring hd

Rapid7 unveils MDR service built for Microsoft users

Thu, 22nd Jan 2026
#
siem
#
cloud security
#
socs
Rapid7 has launched a Microsoft-focused MDR service that fuses Defender telemetry with its SIEM and global SOC for unified threat response.
Yochai corem  2

Check Point unveils AI-ready Exposure Management suite

Thu, 22nd Jan 2026
#
firewalls
#
network security
#
cloud security
Check Point launches AI-ready Exposure Management suite to close remediation gaps as organisations leave half of known vulnerabilities unpatched.
Apac skyline dusk rusty pki locks vs modern cloud security net

Legacy PKI leaves APAC exposed to outages, breaches

Thu, 22nd Jan 2026
#
devops
#
digital transformation
#
encryption
Legacy PKI and manual certificate management leave APAC firms exposed to outages, cyber risks and compliance failures, CyberArk warns.
Stormy tangled server cloudscape it team data leaks high contrast

Cloud security skills gap widens as AI adoption surges

Thu, 22nd Jan 2026
#
saas
#
firewalls
#
data protection
AI-fuelled cloud adoption is outpacing security teams, with Fortinet warning a widening 'complexity gap' leaves hybrid estates exposed.
Australia isometric night cyber defence ai secure infrastructure

AI arms race to reshape Australia's cyber defences by 2026

Wed, 21st Jan 2026
#
malware
#
wearables
#
data protection
AI-powered attacks and defences, quantum threats and smart city risks are set to transform Australia's cyber security landscape by 2026.
Matthew graham

Why Australia must aim higher on the Essential Eight

Wed, 21st Jan 2026
#
mfa
#
cloud security
#
phishing
Australia's Essential Eight has become the cyber benchmark, but clinging to basic compliance leaves organisations exposed to identity-led threats.
Moody robot head hacked by hands glowing cables dark tech lab

Attackers target AI agents with prompt & tool hacks

Wed, 21st Jan 2026
#
application security
#
advanced persistent threat protection
#
rpa
Attackers are already exploiting AI agents, extracting hidden prompts, bypassing safety checks and abusing tools tied to data and systems.
It security team incident response pen testing ms teams office

Cobalt launches two-way Microsoft Teams pentesting tool

Wed, 21st Jan 2026
#
uc
#
devops
#
digital transformation
Cobalt debuts a two-way penetration testing integration for Microsoft Teams, promising faster remediation and real-time security collaboration.
Online gambling laptop roulette cards shield fraud prevention

Betsson turns to Group-IB to tackle online fraud surge

Wed, 21st Jan 2026
#
gaming
#
data analytics
#
digital transformation
Betsson adopts Group-IB's real-time fraud tech to counter rising account takeovers, bonus abuse and payment scams across its platforms.
Australian office dusk stressed owner fragile it cyber risk illustration

SMEs warned over hidden IT fragility as risks rise

Tue, 20th Jan 2026
#
dr
#
digital transformation
#
mfa
Australian SMEs face rising IT fragility as cloud-era misconfigurations, weak oversight and reactive support quietly erode resilience.
Apac office ai modern server racks vs legacy rusty cables night

Cloudflare: outdated apps stifle APAC AI investment gains

Mon, 19th Jan 2026
#
firewalls
#
digital transformation
#
network security
Cloudflare warns outdated apps across APAC are choking AI gains, as modernised firms see triple the returns on their AI investments.
Headshot

Rubrik unveils sovereign cloud to keep sensitive data local

Mon, 19th Jan 2026
#
data protection
#
hybrid cloud
#
cloud security
Rubrik launches Security Cloud Sovereign to keep sensitive data, control and threat detection inside customer-defined national borders.