SecurityBrief Australia - Technology news for CISOs & cybersecurity decision-makers

Cyber Resilience Act (CRA) stories

Flux result aec568f9 6058 4698 84f4 390bda71a536

Cyber rules shift as geopolitics & AI reshape policy

Yesterday
#
data protection
#
digital transformation
#
cloud security
NCC Group says geopolitics, digital sovereignty and AI are driving tougher cyber rules, with boards facing greater accountability and scrutiny.
Editorial storm cloud over server racks cracked padlocks data risk

Red Hat survey finds cloud security incidents rife

Last month
#
data protection
#
digital transformation
#
cloud security
Red Hat survey finds 97% of organisations hit by cloud-native security incidents, forcing delays, higher costs and loss of customer trust.
Editorial storm cloud cloud security failure server racks padlocks warnings

Red Hat finds cloud security incidents hit 97% of firms

Last month
#
data protection
#
hybrid cloud
#
cloud security
Red Hat reports 97% of organisations suffered cloud-native security incidents last year, exposing basic failings in configuration and governance.
Alison

Cloudsmith adds controls to block risky dependencies

Last month
#
devops
#
cloud security
#
application security
Cloudsmith adds automated controls to quarantine and block risky dependencies, tightening enforcement on software supply chain security.
Software supply chain security dashboard global infrastructure

Keysight unveils SBOM Manager to meet new cyber rules

Last month
#
application security
#
physical security
#
devsecops
Keysight debuts SBOM Manager to automate software bills of materials as EU and US cyber rules tighten transparency and compliance demands.
Moody night coding workstation puzzle piece supply chain risks

Open source dependencies leave apps dangerously exposed

Last month
#
uc
#
digital transformation
#
application security
Secure.com warns most apps hide critical flaws in open source components, as unpatched dependencies and licence risks leave firms exposed.
Connected tractor combine wheat field cyber threat clouds

NCC warns of rising cyber risks to connected farming

Last month
#
agricultural technology
#
ransomware
#
cloud security
NCC warns that insecure connected farm machinery could let cyber attacks disrupt harvests, cut yields and threaten food supply chains.
Ai governance zero trust secure data center corridor shield

Xiid & Cytex link AI governance with zero trust access

Sun, 15th Feb 2026
#
firewalls
#
data protection
#
ransomware
Xiid and Cytex join forces to fuse AI governance with zero trust access, targeting shrinking attack paths and stricter cyber regulation.
Modern european factory ai robots zero trust cybersecurity

Industrial AI drives new approach to OT cyber security

Thu, 22nd Jan 2026
#
firewalls
#
cloud security
#
iot security
Industrial AI and IT/OT convergence are forcing factories to abandon closed networks and adopt hybrid, zero trust cyber security architectures.
Corporate boardroom dusk cyber supply chain security locks chains

Codific sets 2026 priorities for boards on cyber risk

Tue, 13th Jan 2026
#
data protection
#
ransomware
#
cloud security
Codific urges boards to prioritise preemptive cyber defence, identity and supply-chain control as 2026 scrutiny and rules tighten.
Europe factory floor ti am6x secure boot board circuit shield

CommScope, TI boost secure boot for industrial devices

Wed, 7th Jan 2026
#
manufacturing
#
mfa
#
cloud security
CommScope launches PRiSM-based secure boot signing for TI AM6x chips, aiming to simplify compliance with tightening industrial cyber rules.
Eu 2026 cybersecurity digital fortress ai threats supply chain

Codific predicts nine key cybersecurity shifts for 2026

Wed, 24th Dec 2025
#
data protection
#
digital transformation
#
encryption
Codific sees 2026 cybersecurity shaped by shadow AI, passwordless logins, tighter regulation and a sharper focus on software supply chains.
Red digital skull vs blue cyber shield ai warfare defense

AI-driven cyber wars to reshape security in 2026

Wed, 10th Dec 2025
#
firewalls
#
data protection
#
dr
AI-powered attackers and defenders will clash in 2026, driving autonomous breaches, VPN failures and stricter rules that reshape cyber security.
Businessperson digital security ai deepfakes masked faces computer circuitry

CISOs face AI, deep-fakes & regulatory minefield in 2026

Fri, 28th Nov 2025
#
encryption
#
phishing
#
advanced persistent threat protection
In 2026, CISOs will confront growing AI risks, deep-fakes, geopolitical threats, and tougher regulations, demanding new strategies for business resilience.
Digital illustration secure corporate network shield ai brain icons

JFrog launches Shadow AI Detection to boost enterprise oversight

Fri, 21st Nov 2025
#
supply chain
#
ai
#
ai ethics & governance
JFrog launches Shadow AI Detection to help enterprises monitor and control unauthorised use of AI models, boosting security and regulatory compliance.
Screenshot 2025 09 17 084541

Samsung appliances achieve IoT security certification from TÜV Nord

Wed, 17th Sep 2025
#
data protection
#
encryption
#
iot security
Samsung's digital appliances, including AI Jet Bot Steam and Bespoke Refrigerators, earn TÜV Nord IoT security certification, reinforcing smart home data protection.
Yubikey

Yubico launches Enhanced PIN YubiKey to boost enterprise security

Wed, 16th Jul 2025
#
mfa
#
iam
#
data privacy
Yubico launches Enhanced PIN YubiKey 5 via its global service, boosting PIN security with stricter rules to help enterprises meet evolving regulations worldwide.
Ps   motor ai

Motor Ai secures USD $20m for transparent autonomous tech

Tue, 15th Jul 2025
#
cartech
#
ai
#
ml
Berlin-based MOTOR Ai raises USD $20 million seed funding to advance transparent, neuroscience-driven Level 4 autonomous tech for Europe's public transport.
Interconnected industrial devices digital security locks ai brain iot edge

Device Authority launches KeyScaler 2025 with AI automation

Thu, 26th Jun 2025
#
iot security
#
edge computing
#
iot
Device Authority unveils KeyScaler 2025, enhancing IoT security with AI automation, new UI and secure edge access for safer device management.
Techday 955d17c05f590dd2e7f3

Post-quantum cryptography gains traction across sectors

Thu, 19th Dec 2024
#
iot security
#
quantum computing
#
supply chain
Keyfactor foresees a pivotal shift in data security practices by 2025, driven by quantum computing advances and the adoption of post-quantum cryptography.