Welcome to the CommSec Blog
Gaming Consoles Are Internet Devices Too
A PlayStation, Xbox, or Nintendo Switch is not just a box under the television. It [...]
Read more
09
Feb
Feb
Why Free Antivirus Is Risky Business
Free antivirus software is often seen as a sensible cost-saving measure. For businesses, it can [...]
Read more
23
Jan
Jan
The Role of CISO as a Service in 2026
CISO as a Service has moved beyond being a cost-saving alternative to a full-time hire. [...]
Read more
15
Jan
Jan
2025 Cyber Security Year in Review: The Risks That Changed Everything
Change defined cyber security in 2025. Long-held assumptions about safety, resilience, and control were challenged [...]
Read more
15
Dec
Dec
5 Questions You Must Ask Before Choosing a Penetration-Testing Vendor
Learn the five essential questions to ask before choosing a penetration-testing vendor. Understand how methodology, [...]
Read more
05
Dec
Dec
A Wake-Up Call on Cloud Resilience
We shine a light on the growing conversation around business continuity and cloud reliance. CommSec [...]
Read more
27
Nov
Nov
Penetration Testing vs TLPT vs BAS: Closing the Detection Gap
The cyber threat landscape is changing fast, and traditional point-in-time testing is no longer enough. [...]
Read more
29
Oct
Oct
Securing the Future: Why AI Security is Now a Board-Level Priority
AI is transforming how organisations operate, but it is also reshaping the threat landscape. As [...]
Read more
28
Oct
Oct
The Growing Cybersecurity Threats Facing Higher Education
Universities have become prime targets for ransomware and credential theft. Recent breaches reveal lessons in [...]
Read more
29
Sep
Sep
When The Browser Becomes a Security Blindspot
Browser extensions are a hidden enterprise risk. Learn how attackers exploit this blindspot and why [...]
Read more
03
Sep
Sep
Why SaaS Security Needs to Be a Top Priority for IT Leaders
SaaS adoption is rising fast, but so are risks. Misconfigurations, unsecured APIs, and outdated security [...]
Read more
19
Aug
Aug
NIS2 Directive Update: Timeline, New Guidance, and What Irish Organisations Must Do
Ireland will enact NIS2 in Q4 2025, with penalties from 2026. About 4,000 organisations must [...]
Read more
08
Jul
Jul
Quantum Computing and the Future of Cybersecurity: Practical Implications for CISOs
Quantum computing is poised to be a game-changer for cybersecurity – for better and for [...]
Read more
27
Jun
Jun
DORA Compliance for Irish Credit Unions A Guide
Credit unions in Ireland may be exempt from DORA until 2028, but the Central Bank [...]
Read more
11
Jun
Jun
Penetration Testing and Compliance: Proving Security Where It Matters Most
Penetration testing plays a critical role in ISO 27001 and NIS2 compliance by validating that [...]
Read more
29
May
May
Why Backups Alone Will Not Save You from Ransomware A NIS2 Perspective
Backups are critical for business continuity, but they are no longer enough on their own. [...]
Read more
22
May
May
Cybersecurity Risks in Mergers & Acquisitions
Discover the key cybersecurity risks in M&A and how to protect your organisation during the [...]
Read more
29
Apr
Apr
A Guide to Email Security and Deliverability
Discover how to protect your brand and improve email performance with robust email authentication and [...]
Read more
24
Apr
Apr
Rising Cyber Risks in Digital Construction
Discover why cyber security is critical in modern construction. Learn about real threats, emerging risks, [...]
Read more
04
Apr
Apr
How AI is Revolutionising Governance, Risk, and Compliance (GRC)
This blog explores how AI is transforming Governance, Risk, and Compliance (GRC) from a reactive, [...]
Read more
24
Mar
Mar
Navigating ISO 27001 Certification: Key Changes, Benefits, and Why You Need It
Discover why ISO 27001:2022 certification is essential for modern businesses. Learn about the key changes, [...]
Read more
21
Feb
Feb
How IT Security Leaders Can Set Themselves Up for Success in 2025
Discover actionable strategies for IT security leaders to overcome 2025's top challenges, including AI risks, [...]
Read more
09
Jan
Jan
How to Choose the Right Cyber Security Solution
Discover the top 10 considerations for selecting the right technology vendor, including integration, scalability, compliance, [...]
Read more
16
Dec
Dec
Patch Management and Software Updates A Practical Guide
Discover the importance of patch management for cybersecurity, operational efficiency, and compliance. Explore top software [...]
Read more
18
Nov
Nov
Secure Communications: The Cornerstone of Compliance in the Digital Era
As businesses adapt to digital transformation, the need for secure communications has become more critical [...]
Read more
29
Oct
Oct
Grants for Businesses to Improve Cyber Security in Ireland
Discover how Irish SMEs can strengthen their cybersecurity with funding opportunities, expert reviews, and grants [...]
Read more
23
Sep
Sep
Understanding Incident Response and Digital Forensics
Explore the differences and synergy between Incident Response and Digital Forensics in cybersecurity, and learn [...]
Read more
27
Aug
Aug
The Role of GRC Tools in Modern Compliance
Discover how GRC tools streamline compliance, reduce manual tasks, and enhance risk management with continuous [...]
Read more
22
Aug
Aug
The NIS2 Directive Uncovered
Discover the essentials of the EU's NIS2 Directive and its impact on cyber security. Learn [...]
Read more
22
Jul
Jul
The Dark Side of AI: A New Era of Cyber Threats
Explore the dark side of AI in cybersecurity – from sophisticated social engineering scams to [...]
Read more
05
Jul
Jul
