[{"id":"705","link":"https:\/\/datascg.com.au\/securing-agentic-ai-identities\/","name":"securing-agentic-ai-identities","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2026\/03\/Securing-NHIs.png","alt":""},"title":"Thoughts on Securing Non-Human Identities in the Age of Agentic AI","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Mar 23, 2026","dateGMT":"2026-03-23 01:34:03","modifiedDate":"2026-03-23 01:34:04","modifiedDateGMT":"2026-03-23 01:34:04","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":24},"status":"publish","content":"Recent data from Field Effect, CrowdStrike, and Rubrik Zero Labs reveals a sobering reality: nearly 80% of cyberattacks now involve compromised identities or stolen credentials.As"},{"id":"671","link":"https:\/\/datascg.com.au\/the-linux-hack\/","name":"the-linux-hack","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2026\/03\/linuxbckd.png","alt":""},"title":"The Backdoor That Nearly Compromised the Internet","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Mar 2, 2026","dateGMT":"2026-03-02 00:56:31","modifiedDate":"2026-03-02 04:25:44","modifiedDateGMT":"2026-03-02 04:25:44","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":59},"status":"publish","content":"The Foundations: we take for granted The modern internet runs on hundreds of millions of servers. Over 70% of web servers globally run on Linux,"},{"id":"464","link":"https:\/\/datascg.com.au\/practical-cybersecurity-tips-for-small-business-owners\/","name":"practical-cybersecurity-tips-for-small-business-owners","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2025\/09\/pctsbo.png","alt":""},"title":"Practical Cybersecurity Tips for Small Business Owners","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Sep 23, 2025","dateGMT":"2025-09-23 00:38:32","modifiedDate":"2025-09-23 00:40:08","modifiedDateGMT":"2025-09-23 00:40:08","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":15},"status":"publish","content":"As information technology plays more and more important role in today\u2019s economy, cybersecurity has become a top priority for businesses of all sizes. However, small"},{"id":"370","link":"https:\/\/datascg.com.au\/the-lessons-learnt\/","name":"the-lessons-learnt","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2025\/07\/avalanche.jpeg","alt":""},"title":"The Lessons Learnt","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Jul 9, 2025","dateGMT":"2025-07-09 02:04:36","modifiedDate":"2025-07-09 02:04:37","modifiedDateGMT":"2025-07-09 02:04:37","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":8},"status":"publish","content":"From one of the Largest Data Breaches in Australian History On 5 June 2024, the Australian Information Commissioner filed civil penalty proceedings in the Federal"},{"id":"366","link":"https:\/\/datascg.com.au\/data-security-in-the-era-of-ai\/","name":"data-security-in-the-era-of-ai","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2025\/07\/datasecurity.png","alt":""},"title":"Data Security in the Era of AI","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Jul 9, 2025","dateGMT":"2025-07-09 02:00:59","modifiedDate":"2025-09-23 00:50:15","modifiedDateGMT":"2025-09-23 00:50:15","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":38},"status":"publish","content":"Artificial Intelligence (also commonly known as AI) is becoming increasingly pervasive in our everyday life. From Siri on your iPhone or Google Assistant on your"},{"id":"363","link":"https:\/\/datascg.com.au\/unpack-secure-design-principles\/","name":"unpack-secure-design-principles","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2025\/07\/secure-design.png","alt":""},"title":"Unpack Secure Design Principles","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Jul 9, 2025","dateGMT":"2025-07-09 01:57:04","modifiedDate":"2025-07-09 01:57:06","modifiedDateGMT":"2025-07-09 01:57:06","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":5,"sec":21},"status":"publish","content":"As you probably heard about the term \u2018Secure-by-Design\u2019 in software engineering, which basically means that software products and capabilities should be designed to be foundationally"},{"id":"360","link":"https:\/\/datascg.com.au\/a-primer-on-defence-in-depth-information-security\/","name":"a-primer-on-defence-in-depth-information-security","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2025\/06\/1169999045.jpg","alt":""},"title":"A Primer on Defence-in-Depth Info Security","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Jul 9, 2025","dateGMT":"2025-07-09 01:40:36","modifiedDate":"2025-07-09 01:42:43","modifiedDateGMT":"2025-07-09 01:42:43","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":1},"status":"publish","content":"In an era where data breaches and cyberattacks have become daily headlines, protecting sensitive information has never been more critical. One of the foundational principles"},{"id":"195","link":"https:\/\/datascg.com.au\/protecting-your-business-from-cyber-threats\/","name":"protecting-your-business-from-cyber-threats","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2025\/06\/CyberBP.png","alt":""},"title":"Protecting Your Business from Cyber Threats","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Jun 13, 2025","dateGMT":"2025-06-13 02:04:23","modifiedDate":"2025-07-04 04:36:25","modifiedDateGMT":"2025-07-04 04:36:25","commentCount":"0","commentStatus":"open","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":10},"status":"publish","content":"Protecting Your Business from Cyber Threats As businesses increasingly rely on technology to operate, cybersecurity has become a critical concern for companies of all sizes."},{"id":"193","link":"https:\/\/datascg.com.au\/understanding-key-social-engineering-techniques\/","name":"understanding-key-social-engineering-techniques","thumbnail":{"url":"https:\/\/datascg.com.au\/wp-content\/uploads\/2025\/06\/SE1.png","alt":""},"title":"Understanding Key Social Engineering Techniques","author":{"name":"scgdata","link":"https:\/\/datascg.com.au\/author\/223736pwpadmin\/"},"date":"Jun 13, 2025","dateGMT":"2025-06-13 02:01:09","modifiedDate":"2025-07-04 04:35:30","modifiedDateGMT":"2025-07-04 04:35:30","commentCount":"0","commentStatus":"closed","categories":{"coma":"Uncategorized","space":"Uncategorized"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":19},"status":"publish","content":"Understanding Key Social Engineering Techniques According to the statistical data released by the Office of the Australian Information Commissioner (OAIC), from July to December 2022,"}]