Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why ANZ Technology Leaders Are Rethinking How AI, Speed, and Security Intersect

The pace of technological change is always fast, but with AI everywhere, things have gone into overdrive. In Australia and New Zealand, businesses plan to spend heavily on generative AI—about $15 million on average, more than the global average. This puts immense pressure on technology, security, and engineering leaders. They must innovate quickly, but they also face complex risks from AI. This is forcing them to rethink how speed and security can work together.

Trend Micro Fixes Several Critical Vulnerabilities in Apex Central and Endpoint Encryption PolicyServer

On June 10, 2025, Trend Micro released fixes for six critical vulnerabilities affecting Apex Central and Endpoint Encryption PolicyServer. Five of the vulnerabilities allow remote code execution (RCE), and one enables authentication bypass. The vulnerabilities were responsibly disclosed by the Zero Day Initiative (ZDI), a vulnerability research organization owned by Trend Micro.

Proving the ROI of Vulnerability Assessments: A CISO Guide

In cybersecurity, the value of vulnerability assessments (VA) is widely acknowledged but not always quantified. For many decision-makers, “just preventing an attack” isn’t a strong enough business case. They want to know: What is the return on investment (ROI)? How does this investment contribute to the bottom-line, reduce business risk, or improve operational performance?

What to Do After a Vulnerability Is Found: From Risk Mitigation to Automated Remediation

The Real Breach is in Delay, Not Detection Detecting vulnerabilities is no longer the hard part. With powerful scanners, continuous monitoring, and security frameworks in place, most organizations can identify weaknesses in their systems quickly. But the real risk begins after a vulnerability is found. According to the Verizon 2025 DBIR, released on April 23, there has been a 34% increase in successful vulnerability exploitations over the past year, compounding a 180% rise from the previous report.

Answering 7 Questions About Trustwave Managed Vulnerability Scanning (MVS)

Understanding and mitigating vulnerabilities is paramount for any organization. Trustwave's Managed Vulnerability Scanning (MVS) offers a comprehensive solution to help businesses stay ahead of potential risks and ensure proper database protection. But what exactly is MVS, and how can it benefit your organization? We've compiled answers to seven key questions about Trustwave MVS, providing a clear overview of its capabilities, benefits, and how it stands out from the crowd.

The Future of Vulnerability Management is Aggregated, Automated, and Agnostic

For years, vulnerability scanners have been the cornerstone of enterprise security programs. But as organizations scaled, and as infrastructure, applications, and attack surfaces diversified, the single-scanner model broke down. Security teams now face a fragmented reality. Data pours in from dozens of sources: endpoint detection tools, cloud security platforms, application security testing, and more. Each of these systems generates findings with its own schema, priorities, and assumptions. The result?

AI-automated Fuzzing Uncovers Two More Vulnerabilities in wolfSSL

Daniel Pouzzner from wolfSSL has challenged us to find 3 more vulnerabilities in the wolfSSL library, after we found the first one in October 2024. We weren't quite able to find three, but here are the additional two that we found: Both vulnerabilities were fixed in wolfSSL version 5.8.0, released on 24 April 2025. The fuzz tests that found these vulnerabilities were generated by our AI Test Agent.

Build Fast, Stay Secure: Guardrails for AI Coding Assistants

AI coding assistants like GitHub Copilot and Google Gemini Code Assist are changing how developers work — accelerating delivery, removing repetition, and giving teams back time to build. But speed isn’t free. Studies show that around 27% of AI-generated code contains vulnerabilities, not because the tools are broken, but because they generate code faster than most teams can review it. The result? A growing wave of insecure code is making it into production.

Finding Software Flaws Early in the Development Process Provides Clear ROI

Organizations spend enormous effort fixing software vulnerabilities that make their way into their public-facing applications. The Consortium for Information and Software Quality estimated that the cost of poor software quality in the United States reached $2.41 trillion in 2022, a number sure to be much higher today. That’s nearly 10% of the current GDP within the US. As we will show, it makes sense that the cost of poor software quality is so high.