Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

1:1 Cybersecurity Chat with Amelia Gowa at CISO Sydney 2024 | Filmed by AZK Media

Filmed at CISO Sydney 2024 by AZK Media, this exclusive conversation with Amelia Gowa, Trustwave’s NSW State Director, explores the key cybersecurity challenges facing organizations today. In this interview, Amelia shares her insights on: The evolving threat landscape in 2025 How AI, IoT, and cloud are reshaping cybersecurity risks The impact of third-party dependencies and shadow IT Why a proactive, intelligence-led security strategy is essential.

AIDA - Fighting AI with AI

AIDA (Artificial Intelligence Defense Agents) is an AI-native suite of agents that supercharges your approach to human risk management. It leverages multiple AI technologies to create personalized, adaptive, and highly effective training for all of your users that actually changes behavior. By automating template generation, training, and reporting, AIDA reduces the administrative burden on your security teams so they can focus on protecting your network.

Why Vendor Risk Management Can't Be a One-Time Task

Organizations across nearly every industry have become reliant on third-party relationships to accomplish their business operations. You’d be hard-pressed to find an organization that doesn’t partner with at least one third-party vendor. However, this growing reliance on vendors has also created an evolving threat landscape—vendors are now prime targets for cyberattacks.

Detect cross-account access risks in AWS with Datadog

Managing access across multiple AWS accounts is a popular approach to isolating workloads and data. While it provides several benefits to organizing the various operational requirements for the environment, it introduces additional complexity for managing IAM policies and workload permissions. A primary concern is assigning too many permissions to any one source, which increases the risk of an attacker moving within the environment undetected.

A Basic Guide to SQL Server Security Fundamentals

Organizations today collect and generate enormous volumes of sensitive data. Much of it is stored in SQL Server databases, making SQL Server security management crucial for protecting critical applications and services. Implementing strong Microsoft SQL Server security measures helps organizations defend against cyber threats and comply with regulations like GDPR, HIPAA, and PCI DSS.

Enhanced VRM solution unlocks how organizations manage, monitor, and maintain oversight of third-party risk

It’s no secret that managing vendor risk is one of the most challenging aspects of any security program—our most recent State of Trust report found that one in two businesses have terminated a vendor relationship due to security concerns. The rapid proliferation of SaaS tools and AI technologies only ups the ante by increasing the complexity of vendor monitoring and oversight. ‍

Alert: Phishing Attacks Use New JavaScript Obfuscation Technique

Researchers at Juniper Threat Labs warn that phishing attacks are utilizing a new obfuscation technique to hide malicious JavaScript. “While investigating a sophisticated phishing attack targeting affiliates of a major American political action committee (PAC) in early January 2025, Juniper Threat Labs observed a new JavaScript obfuscation technique,” the researchers write.

Q&A with Martin Kraemer on Information Sharing in Cybersecurity

Recently, Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at King’s College London released a Whitepaper called: “Cybersecurity Information Sharing as an Element of Sustainable Security Culture,” which examines how people consume and share cybersecurity information, revealing the role that workplace training plays in fostering information sharing among colleagues.

The Microsoft Security Score: The Future Benchmark of Enterprise Security and Trust

Trustwave has engaged with hundreds of enterprise customers across Australia and worldwide, and one overarching theme continues to emerge. Cybersecurity is no longer an IT problem; it is a core business concern. Executives, board members, procurement teams, and even marketing departments are beginning to realize that security is not just about preventing breaches but about establishing trust, enabling business, and gaining competitive advantage.

Connect and secure from any network to anywhere

Build your new corporate network with Cloudflare, connecting any network into our modern SASE platform. In this video learn all the different methods of connecting networks to Cloudflare and what services can then be used to improve security and performance. Chapters: Watch the rest of the videos in our series to learn more about Cloudflare's SASE platform. Dive deep into the architecture of how our SASE platform works by reading our reference architecture content.