top of page
All Posts


Three Things Every Australian Business Leader Needs to Know About Cyber Threats in 2026
Last week, I had the privilege of co-presenting with Andrew Aston from Google Cloud Security and Mandiant Intelligence on the cyber threat outlook for Australian businesses. After more than 25 years in this industry, events like this still energise me. Not because of the presentations, but because of the conversations that followed. The discussions we had afterwards were particularly impactful. IT leaders, security professionals, and business owners sharing what keeps them up

Ajay Unni
Dec 7, 20254 min read
Understanding the Modus Operandi of Major Cyber Attacks in Australia (2020-2025)
Australia experienced a sharp rise in high-impact cyber-attacks over the last half-decade, ranging from crippling ransomware in logistics...

Yash Thakur
Aug 7, 20254 min read


StickmanCyber Accredited by CREST International for Cybersecurity Services
StickmanCyber are proud to have officially earned CREST Accreditation , validating our capabilities in three key cybersecurity services :...

Yash Thakur
Jul 25, 20251 min read


SIEM as the Secret Weapon for Midsize enterprises to handle Cyber Threats
When it comes to defending midsize businesses, just meeting compliance isn't enough anymore. Security Information and Event Management...

Ajay Unni
Jun 7, 20256 min read


CISO's Guide: Revolutionise Access with AI-Powered Identity Management
CISOs are in the middle of a big shift: using AI to improve Identity and Access Management (IAM) for stronger security and smoother...

Ajay Unni
Jun 5, 20257 min read


Legacy IAM: Unmasking Hidden Costs and Secure Alternatives
Unmasking costs of legacy systems step-by-step Is your organisation still running on an old Identity and Access Management system? It...

Ajay Unni
Jun 3, 20257 min read


The AI Cybersecurity Promise: Cutting Costs in Half
Feeling stuck watching your cybersecurity budget grow but not seeing clear results? You’re not alone. Many IT managers struggle to...

Ajay Unni
May 22, 20255 min read


Top 10 Questions to Ask Your Penetration Testing Vendor
So, you have built a great SaaS App!! But what about its security? There are a wide range of penetration testing vendors with the...

Ajay Unni
Mar 16, 20254 min read


Build Confidence with a 4 step Practical Approach to Cybersecurity Risk Management
Introduction: Move Beyond Fear to Confidence in Cybersecurity For many organizations, cybersecurity is often framed in the language of...

Ajay Unni
Mar 9, 20253 min read


8 Step Guide to ISO 27001 certification
Introduction: Why ISO 27001 Matters In today’s digital landscape, cybersecurity is no longer optional —it’s a business necessity....

Ajay Unni
Mar 9, 20254 min read


5 steps to transition your cybersecurity from Firefighting to Forecasting: Moving Up the Cybersecurity Maturity Model
Climbing up the Cybersecurity Maturity Model with support. Why Reactive Security is No Longer Enough For many organizations, cybersecurity...

Ajay Unni
Mar 9, 20253 min read


The most common cause of mega data breaches in Australia worries me.
The frequency and severity of mega data breaches in Australia have surged in recent years, exposing the personal information of millions....

Ajay Unni
Feb 15, 20253 min read


Compliance vs. Security: Why Australian Companies Are Still Getting Hacked
In an era of ever-evolving cyber threats, Australian businesses are more regulated than ever when it comes to data protection. The...

Ajay Unni
Feb 15, 20253 min read


The Rise of Mega Data Breaches in Australia
In recent years, Australia has seen a dramatic rise in large-scale data breaches, exposing the personal information of millions of...

Ajay Unni
Feb 15, 20253 min read
bottom of page
