AI cloning and deepfakes rank among the top challenges for Australian cybersecurity professionals in 2025. Read more »
The proposed mandate intends to discourage criminals from targeting critical national infrastructure and public services, as there will be no financial motivation. Read more »
Microsoft’s monthly patches cover Hyper-V NT Kernel Integration VSPs, Git in Visual Studio, and more. Read more »
The proposed HIPAA Security Rule introduces mandatory measures to prevent malicious cyberattacks in health care. Read more »
Cyber security maturity declines among Australian government agencies in 2024, as legacy IT systems hinder progress under the Essential Eight framework. Read more »
The Biden administration states the rule will prevent U.S. chips from passing to China through countries loosely allied or not politically allied with the U.S. Read more »
IT hiring intentions remain strong, though competition for jobs could be fierce. Read more »
Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of open-source software in 2025. Read more »
The Cyber Trust Mark shows which devices meet FCC security standards — similar to an energy-use label. Read more »
Read our IVPN review to uncover its strong security features and privacy-first approach. Discover what sets it apart — but are there hidden drawbacks? Read more »