top of page

Search
All Posts


“Identity Drift” is the silent killer
In most Microsoft 365 environments (or any other environement where there is an identity providor involved), the biggest risk isn’t a...

Cornerstone Cyber
Aug 142 min read


Key Strategies for Managing Devices Securely
In today's fast-paced digital world, securely managing devices has become a crucial necessity for both organisations and individuals....

Cornerstone Cyber
Aug 145 min read


What Is Zero Trust and Why It Matters in Cybersecurity
In today’s digital world, cybersecurity threats are evolving rapidly. Traditional security models that rely on perimeter defence are no...

Cornerstone Cyber
Aug 144 min read


Steps to Ensure Security in Day-to-Day Business Processes
In today’s fast-paced business environment, ensuring security in daily operations is more critical than ever. Cyber threats, data...

Cornerstone Cyber
Aug 145 min read


Choosing the Right Expertise for Cyber Threat Protection
In a world that increasingly relies on technology, the importance of cyber security cannot be overstated. Organisations of all sizes are...

Cornerstone Cyber
Aug 143 min read


Container Security in AKS/EKS: What Australian Businesses Need to Know
Containers and Kubernetes offer incredible agility but introduce novel risks. In Australia, where industries from finance to mining adopt...

Cornerstone Cyber
Jul 31 min read


Breaking Down “EchoLeak”: A Zero-Click AI Vulnerability in Microsoft 365 Copilot
Earlier this month, cybersecurity researchers at Aim Labs publicly disclosed “EchoLeak,” the first known zero-click vulnerability in...

Cornerstone Cyber
Jul 32 min read


In the Wake of the Qantas Breach: Rethinking Identity Verification
The recent cyber-attack on Qantas – which saw personal information for roughly six million passengers, including names, email addresses,...

Cornerstone Cyber
Jul 32 min read


Adaptive Authentication: The Next Frontier in User Verification
Traditional multifactor authentication (MFA) applies the same challenge prompts to every sign-in, regardless of context. Adaptive...

Cornerstone Cyber
Jul 32 min read


Software Supply-Chain Risk: From Open-Source to CI/CD
Modern software development relies heavily on open-source components and automated CI/CD pipelines. While these drive speed and...

Cornerstone Cyber
Jul 32 min read


The Economics of Cybersecurity: Speaking CFO Language
Security often gets pigeonholed as a cost centre, but reframing it as a strategic investment can unlock boardroom support and budget...

Cornerstone Cyber
Jul 32 min read


Guest Access in Teams: Hidden Pitfalls & Awareness Points
Microsoft Teams’ guest access feature transforms external collaboration—clients, partners and contractors can join channels, share files...

Cornerstone Cyber
Jul 32 min read


Continuous Red Teaming: Moving Beyond Annual Pen-Tests
Traditional annual penetration tests provide a snapshot of security posture but can miss threats emerging between engagements. Continuous...

Cornerstone Cyber
Jul 31 min read


AI Ethics & Privacy: Balancing Innovation with Australian Regulation
AI and machine learning drive powerful insights but also introduce privacy and ethical considerations. As Australia updates its Privacy...

Cornerstone Cyber
Jul 31 min read


The Rise of Identity-Based Attacks: From Password Spray to Pass-the-Cookie
Identity is the new perimeter. Australian organisations increasingly face sophisticated credential attacks—password spray, credential...

Cornerstone Cyber
Jul 31 min read


Third-Party Vendor Access: Mitigating Supply-Chain Insider Risk
In an interconnected world, Australian organisations routinely grant third-party vendors privileged access to systems and data. Whether...

Cornerstone Cyber
Jul 32 min read


Zero Trust Beyond Identity: Securing Microservices & APIs
Zero Trust is often equated solely with identity and device verification, yet the modern cloud-native era demands that organisations also...

Cornerstone Cyber
Jul 32 min read


The State of Phishing in Australia: Emerging Tactics & Trends
Phishing remains the top vector for initial compromise in Australia. Recent ACSC reports show a marked uptick in credential-harvesting...

Cornerstone Cyber
Jul 32 min read


Navigating Virtual Desktop Security in Azure and Windows 365
As more Australian organisations embrace flexible work models, virtual desktop infrastructure (VDI)—whether Azure Virtual Desktop (AVD)...

Cornerstone Cyber
Jul 32 min read


Ransomware Readiness: Beyond Backups
Ransomware remains one of the most potent threats facing Australian businesses. While robust backups are vital, true “readiness” extends...

Cornerstone Cyber
Jul 32 min read
bottom of page