The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. CyberArk area VP ANZ Thomas Fikentscher outlines his key cybersecurity predictions highlighting a singular truth: businesses must prioritise robust, forward-thinking security measures to stay ahead in an increasingly complex digital environment.
GUEST OPINION: The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency.
CyberArk (NASDAQ: CYBR), the global leader in identity security, announced the launch of FuzzyAI, a cutting-edge open-source framework that has jailbroken every tested AI model. Fuzzy AI helps organisations identify and address AI model vulnerabilities, like guardrail bypassing and harmful output generation, in cloud-hosted and in-house AI models. FuzzyAI’s fully extensible framework is available as open-source software on CyberArk Labs’ GitHub Page.
CyberArk (NASDAQ: CYBR), the global leader in identity security today released the results of new employee research that reveals that many common employee data access behaviors are putting organisations at risk. It found that while Australian employees are generally more compliant with cybersecurity policies than other countries, more than 60% still admit to bypassing policies for convenience, and 33% use the same log in credentials for both personal and workplace applications and services.
COMPANY NEWS by CyberArk & Australian Cyber Collaboration Centre: With the ongoing cybersecurity hacks Australia has been experiencing, it is essential organisations are equipped with the knowledge and skills to be cyber resilient, particularly in the area of critical infrastructure.
Identities, resources, assets, data, devices, code, cloud, companies, APIs, apps, partners, people... there are so many factors at play in companies today, so many attack vectors and surfaces, so much to manage and more, but in a sea of cyber attacks, CyberArk stands ready to help you go fearlessly forward, with CyberArk Australia and New Zealand Regional Director, Thomas Fikentscher, joining iTWireTV to explain the state of cybersecurity.
Identities, resources, assets, data, devices, code, cloud, companies, APIs, apps, partners, people... there are so many factors at play in companies today, so many attack vectors and surfaces, so much to manage and more, but in a sea of cyber attacks, CyberArk stands ready to help you go fearlessly forward, with CyberArk Australia and New Zealand Regional Director, Thomas Fikentscher, joining iTWireTV to explain the state of cybersecurity.
Identity security specialist CyberArk has appointed Dr Stephenie Andal to the role of ANZ partner manager.
Attempts to compromise Australian corporate and government networks are inevitable, the managing director of Blackberry Spark ANZ, Jason Duerden, says, adding that while this cannot be prevented they can be contained and protected against by applying a risk mitigation approach to cyber security.
Privileged access management company CyberArk has appointed Thomas Fikentscher as regional director for Australia and New Zealand.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]