IT Brief Australia - Technology news for CIOs & IT decision-makers

Supply Chain Security stories - Page 11

Cloud computing classroom open padlocks security risk training

Misconfigured cloud training labs open paths to attacks

Fri, 23rd Jan 2026
#
firewalls
#
hyperscale
#
cloud security
Misconfigured cloud training labs on AWS, Google Cloud and Azure expose major firms to live attacks via overly permissive access roles.
Rob 768x768

Exclusive: e2e-assure CEO on CNI defence from geopolitical cyberattacks

Fri, 23rd Jan 2026
#
firewalls
#
network infrastructure
#
digital transformation
Rob Demain warns that cyber campaigns on critical infrastructure are demanding behaviour-led defence over compliance.
Ev charging station cybersecure smart grid open source shield

LF Energy audit boosts security of EVerest EV charging

Thu, 22nd Jan 2026
#
iot
#
cartech
#
supply chain
LF Energy's audit of the widely used EVerest EV charging stack finds and fixes security flaws, boosting confidence in open source grids.
Aus nz cybersecurity map glowing circuits data leak barrier

AI reshapes data privacy risk across Australia, NZ

Thu, 22nd Jan 2026
#
data protection
#
devops
#
hybrid cloud
AI is reshaping data privacy in Australia and New Zealand, exposing shadow tools, privilege sprawl and weak identity controls, experts warn.
Australia isometric night cyber defence ai secure infrastructure

AI arms race to reshape Australia's cyber defences by 2026

Wed, 21st Jan 2026
#
malware
#
wearables
#
data protection
AI-powered attacks and defences, quantum threats and smart city risks are set to transform Australia's cyber security landscape by 2026.
Software team security champion analyzing shield icon large screen

Practical DevSecOps launches hands-on security course

Wed, 21st Jan 2026
#
devops
#
application security
#
devsecops
Practical DevSecOps unveils a hands-on Certified Security Champion course to embed security advocates inside software development teams.
Andrew

Exclusive: Genetec dives into the latest State of Physical Security Report

Wed, 21st Jan 2026
#
firewalls
#
data analytics
#
digital transformation
Physical security data is shifting from siloed cost centre to strategic asset, reshaping IT, AI adoption and cross‑functional decision-making.
Australian office dusk stressed owner fragile it cyber risk illustration

SMEs warned over hidden IT fragility as risks rise

Tue, 20th Jan 2026
#
dr
#
digital transformation
#
mfa
Australian SMEs face rising IT fragility as cloud-era misconfigurations, weak oversight and reactive support quietly erode resilience.
Professor frank den hartog  cisco research chair  2

Australia warned over unpreparedness for drone cyber-attacks

Tue, 20th Jan 2026
#
drones
#
hyperscale
#
iot security
Australia's power, water and telecoms at risk as report warns critical infrastructure lacks defences against emerging drone-borne cyber threats.
Ao2026 social 4

CyberCX extends Australian Open cyber security deal

Mon, 19th Jan 2026
#
firewalls
#
data protection
#
devops
CyberCX will stay on as the Australian Open's cyber security partner through 2026, as tennis ramps up defences against digital threats.
London skyline dusk digital vendor network third party cyber risk

Cyb3r Operations raises $5.4m to tackle cyber risk

Fri, 16th Jan 2026
#
saas
#
cloud security
#
advanced persistent threat protection
London's Cyb3r Operations raises $5.4m to expand real-time monitoring of third-party cyber risk as supply-chain threats intensify.
Interlocking metal shields hybrid cloud datacenter ai security

Delinea and StrongDM to improve identity security for Agentic AI era

Fri, 16th Jan 2026
#
devops
#
hybrid cloud
#
pam
Delinea is set to acquire StrongDM, uniting privileged access and runtime authorisation to secure AI agents and non-human identities at scale.
Nighttime atm suspicious face glow hooded smartphone windows ui

AI-driven scams & Windows 11 reshape ATM crime risk

Fri, 16th Jan 2026
#
endpoint protection
#
physical security
#
supply chain
AI-powered social engineering and Windows 11 upgrades are reshaping ATM crime, shifting attacks from skimming to manipulative fraud.
Realistic ai data center rows gpu racks with energy shield view

Check Point joins Nvidia design to secure AI factories

Thu, 15th Jan 2026
#
firewalls
#
data protection
#
datacentre infrastructure
Check Point adds AI Cloud Protect to Nvidia's Enterprise AI Factory design to secure purpose-built AI data centres without GPU performance hit.
Adlink

ADLINK gains IEC 62443-4-1 nod for secure edge R&D

Wed, 14th Jan 2026
#
robots
#
uc
#
devops
ADLINK secures IEC 62443-4-1 certification, formalising a secure-by-design R&D framework for its industrial edge and OT computing products.
Pieter danhieux

Agentic AI double agents expose dangerous security gaps

Wed, 14th Jan 2026
#
application security
#
devsecops
#
supply chain
Agentic AI promises rapid software gains, but a recent Claude Code cyberattack shows how “double agents” can outpace unprepared developers.
George gerchow

AI to transform business risk, trust & compliance by 2026

Wed, 14th Jan 2026
#
uc
#
data protection
#
dr
AI will reshape risk, trust and compliance in 2026 as firms swap hype for embedded tools, tighter controls and higher regulatory scrutiny.
Corporate boardroom dusk cyber supply chain security locks chains

Codific sets 2026 priorities for boards on cyber risk

Tue, 13th Jan 2026
#
data protection
#
ransomware
#
cloud security
Codific urges boards to prioritise preemptive cyber defence, identity and supply-chain control as 2026 scrutiny and rules tighten.
Ai funded autonomous coding security glowing shield office scene

DryRun raises USD $8.7m to secure AI-driven coding

Tue, 13th Jan 2026
#
devops
#
application security
#
devsecops
DryRun lands USD $8.7m seed round as demand grows for its AI-native code security tools targeting LLM-driven and autonomous coding workflows.
Simon ritter

How Java will power secure, enterprise-scale AI by 2026

Tue, 13th Jan 2026
#
supply chain
#
risk & compliance
#
erp
By 2026, Java is tipped to be AI's production backbone, driving heavier compute, tighter security and runtime modernisation.