💡 You Can’t Secure What You Can’t See: The Case for SBOMs

Modern software is assembled from countless third‑party and open‑source components. And if you can’t see them, you can’t secure them. 🔎🔐
This article explains why SBOMs (Software Bills of Materials) are becoming essential for managing supply‑chain risk, strengthening incident response, and meeting rising security and compliance expectations.
If you want faster visibility, better control, and fewer surprises in your software stack, this one’s for you.
We’re hiring: Security Services Senior Specialist (AppSec)
We’re expanding our security team at AMP and hiring a Security Services Senior Specialist to lead application security, penetration testing, and vulnerability management.
You’ll own and uplift our AppSec framework, pen‑testing program, and vulnerability lifecycle, shaping engineering practices and protecting millions of customers.
You’ll be great for this role if you have:
🔹 Strong AppSec, pen testing, and vuln‑management experience
🔹 Confidence owning services and improving processes
🔹 Experience in regulated environments
🔹 Ability to turn technical risks into clear guidance
Join us to make a real impact on the future of financial services while growing your career.
➡️ Apply now: Security Service Senior Specialist
We’re hiring: 2x Enterprise Security Architects
We’re expanding our security leadership capability and are recruiting two Enterprise Security Architects to help shape and protect a complex, customer‑centric financial services environment.
If you’re passionate about designing security that enables the business, working at enterprise scale, and influencing outcomes across cloud, data, and core platforms, this could be a great next step.
➡️ Apply now: Entreprise Security Architect
💡Agentic AI's Identity Crisis

Agentic AI — autonomous 🤖 agents that can perceive, decide, and act — are entering business workflows fast. But as these non-human “digital workers” multiply, identity has become the hidden challenge.
Most enterprises haven’t extended authentication and access controls to these agents, creating ungoverned digital personas operating at machine speed: a serious security risk.
This article explores why identity is the new frontier of AI security, and how cybersecurity leaders can govern agentic AI safely through strong authentication, lifecycle management, and accountability.
Australian School Cyber Challenge 2026
🧑🎓 Thousands of students and schools will be shaping the future of Australia’s cybersecurity talent. ASCC 2026 brings together students from every state and territory, building a sense of competition, community, and pride.
Students step out of the classroom and onto a national stage where creativity, curiosity and critical thinking shine. Schools benefit from increased visibility, community engagement, and recognition for their support of future-ready education.
If your school wants to be part of something meaningful and future-focused, this is it.
At AMP, supporting programs that nurture innovation, education, and technology skills is something we deeply believe in, and the Cyber Challenge is a perfect example of that mission in action.
Looking forward to seeing the creativity, curiosity, and determination of all the participating students this year!
Find out more at https://cyberpathways.com.au/ascc/
Looking for a Cyber Engineering Specialist
If you're passionate about building secure systems that enable innovation, we’d love to hear from you.
Our Security, Risk & Compliance team is deeply embedded in the organisation - driving strategy, enabling transformation, and protecting what matters. We work with purpose, backed by strong leadership and a clear mandate.
We’re hiring a 🧑💻 Cyber Engineering Specialist to join us in Sydney.
➡️ Apply now: Cyber Engineering Specialist
Cyber Security Awareness Month 2025
The event was buzzing with energy: interactive challenges, live demos, and conversations that turned complex topics into practical, actionable insights. Read More…
💡 Quantum Computing and the Future of Encryption

Quantum computing promises breakthroughs in science, medicine, and technology — but it also poses one of the biggest challenges yet to our digital security.
This article explores why organisations should be preparing now for a post-quantum world — not out of panic, but prudence.
Because when the flood comes, you don’t want to be halfway across the bridge.
- 🔒 What happens when quantum computers can break today’s encryption?
- 🧭 Why “harvest now, decrypt later” makes this a present-day risk?
- 🛠️ And how can organisations start planning for the transition?
Cyber Awareness Month 2025
During the session, we covered a wide range of tips applicable to both work and home environments. From utilising auto-updates for all devices, (including robot vacuums!), to segmenting home Wi-Fi networks. We emphasised the importance of proactive security measures in the era of AI. Particularly, we discussed safeguarding children and older family members online.
We wrapped up by asking: “What’s one thing you’d recommend to others to stay secure?” Here are some key takeaways from the discussion:
- ✨ Enhance security by enabling Multi-Factor Authentication (MFA) and transitioning to passwordless solutions.
- 🔑 Simplify password management with tools like 1Password, Microsoft Wallet, Google Password Manager and iCloud Passwords to handle complex and unique passwords effortlessly.
- 🔍 Stay vigilant by checking for data breaches using Have I Been Pwned and promptly updating compromised passwords.
- 🤔 Exercise caution before clicking on links and maintain awareness of your online activities to protect your digital footprint.
It's truly commendable to witness our AMP team's commitment to cybersecurity awareness and proactive measures.
Thanks Kathy Grosse, Daniel Lupton, Vineet Ppulikottil, Max Phongsack, Steve Espino and Daisy Clarke.
