Contact

Case Studies & Expert Insights

Explore expert insights and case studies from Liverton Security.

Learn about the complexities of cybersecurity.
Expert Insights

Complexity of Security (Part 1)

Security doesn’t fail because people don’t care—it fails when it’s too complex. With organisations juggling dozens of security tools, confusion has become a hidden vulnerability. Cybersecurity expert, Andrew Johnston, explains how over-engineered systems and technical language drive people to bypass security, and why simplicity—not more controls—is the key to building security that actually works.
Learn More

All Case Studies & Expert Insights

Deep dive into solutions and cybersecurity topics with our experts

Cybersecurity Expert Insights - How AI-generated code can introduce vulnerabilities, testing gaps, and exposed secrets.
Expert Insights

Vibe Coding: The Hidden Security Risks of AI-Generated Software

Artificial intelligence is making software development more accessible than ever, allowing users to generate code simply by describing what they want. This emerging practice, often called “vibe coding,” promises faster development and greater accessibility. However, without proper requirements, testing, and security awareness, AI-generated software can introduce serious vulnerabilities. Understanding the risks behind AI-assisted development is essential before deploying code into production environments.

Cybersecurity Expert Insights - AI poisoning can produce biased and harmful results.
Expert Insights

AI Prompt Poisoning: Understanding the Threat – And Why You Need to Pay Attention

Artificial intelligence is rapidly changing the way we work, and with that change comes a new set of security challenges. One of the most concerning is ‘AI prompt poisoning’ – a technique where someone intentionally manipulates the instructions given to an AI model to generate unwanted or harmful results.

Cybersecurity Expert Insights - Staying secure requires more than NZISM, PSR, and Privacy Act checks.
Expert Insights

When NZ organisations get breached, the same question keeps coming up—"How did this happen when we were compliant?"

Compliance frameworks like NZISM, PSR, and the Privacy Act were never intended to be treated as annual checklists. Their underlying assumption is that controls operate continuously, risks are reviewed as environments change, and people actively protect information. When organisations treat compliance as a finish line, security drifts — and that gap between audits is where breaches occur. Real security maturity comes from ongoing assurance, not point-in-time compliance.

Cybersecurity Expert Insights - Maturity assessments ensure security measures keep up with changes in an organisation.
Expert Insights

Bridging Directly To Continuous Maturity Assessments

As organisations change, security often drifts out of alignment. Continuous maturity assessment helps identify weakening controls, workarounds, and emerging risks early—before they turn into incidents. It provides a practical way to keep security relevant, effective, and aligned with how a business operates as it evolves.

Cybersecurity Expert Insights - What's the difference between IT Services and cybersecurity?
Expert Insights

One of the biggest security risks in New Zealand isn’t technology. It’s misplaced responsibility

Many organisations assume cybersecurity is handled by their IT or network provider, but IT operations and security are not the same discipline. While firewalls, endpoint tools, and cloud controls are important, security fails when it becomes technology-led instead of risk-led. Real security requires governance, skilled people, and continual review—not just tools left to run on default settings. Without dedicated security leadership and maturity assessment, organisations can appear secure on paper while remaining exposed in practice.

Cybersecurity Expert Insights - How to spot fake emails that can harm your organisation.
Expert Insights

The $500 Gift Card That Nearly Cost Millions: Understanding Executive Email Spoofing

A seemingly harmless email request from the CEO asking a new employee to purchase gift cards led to a serious security incident. This real-world case study shows how preventable failures and weak email security controls can result in significant financial and reputational damage, underscoring the critical importance of robust email security in modern organisations.