Cyber Security OT security starts with identity – who’s really accessing your systems?

In Operational Technology (OT), control is everything—over processes, production, and safety. But what about access control? Do you know exactly who... Read more

Cyber Security Cyber Security Act 2024: What your business must do in 2025

Is your business ready—or are you hoping for the best? The Cyber Security Act 2024, introduced in late 2024, has redefined how Australian businesses... Read more

IT & Cloud What is level 1, 2 & 3 IT support and what support do you need?

Understanding IT support levels: What's right for your business? IT support is the backbone of modern businesses, ensuring smooth operations and... Read more

Automation The Neural Link | Edition 4

Welcome to the latest edition of The Neural Link! January kicked off the new year with major moves in generative AI – from AI agents that browse the... Read more

Press release The Missing Link strengthens cyber defence with new Security Operations leader

Sydney, [5 February, 2025] – The Missing Link, a leading provider of cyber security solutions, has appointed Tim Niblett as Head of Security... Read more

IT & Cloud Why you need a plan for Windows 10 End of Support

Windows 10 has been the backbone of many businesses for years, but the countdown to its End of Support (EOS) is officially on. Come October 14, 2025,... Read more

Press release Empowering Education: Flinders University Partners with The Missing Link for AI Training

[Sydney, Australia – 13 January 2025] – The Missing Link, a leader in intelligent AI and automation solutions collaborates with Flinders University... Read more

Automation The Neural Link | Edition 3

Welcome to the latest edition of The Neural Link! As we step into 2025, here’s a look back at the most exciting AI developments from... Read more

Cyber Security 2024: A Cyber Security Review

Originally posted on LinkedIn. With yet another year under our belt, I took some time to look back on the year that was 2024 and what happened in the... Read more

Cyber Security What is External Attack Surface Management (EASM)?

Your digital perimeter might seem secure, but without full visibility into your external assets, you could be leaving the door open for... Read more

Cyber Security From Phuket with insight: Celebrating partnership success with Cloudflare

I was recently fortunate enough to join the Cloudflare team on an unforgettable trip to Phuket, Thailand. This was an incentive trip celebrating... Read more