Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it also opens the door for innovative cyber threats. Indeed, this “transformative and dualistic shift” presents unprecedented challenges and opportunities and is sparking calls for regulatory measures to ...

Podcasts

KBI.Media Update | Cordant launches DevSecOops
byKBI.Media

We are thrilled to announce the arrival of a new addition to our podcast family on KBI.FM: DevSecOps, brought to you by Cordant.

Hosted by the insightful trio of Tom Walker (the infrastructure tragic), Scott Fletcher (the security ninja), and James Vincent (the cloud alchemist), this show promises to deliver a deep dive into the world of cloud, security, and infrastructure.

Here are 3 key takeaways for you:

  • Comprehensive Expertise: Engage with content that combines expertise in infrastructure, security, and cloud, providing a holistic view of today’s technological environment.
  • Diverse Perspectives: Hosted by industry specialists, the podcast brings together various outlooks, giving listeners a rich and varied understanding of complex topics.
  • Part of KBI FM Network: As a part of the respected KBI.FM podcast network, expect well-curated content designed to inform and inspire.

Business News ↓

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a larger network breach. These are not hypothetical situations; they are real threats that healthcare organizations face today. As medical devices become increasingly interconnected, they also become prime targets for...

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was responsible for enterprise-wide digital security and resiliency. Bret...

Benjamin Lamont & Helen Schneider – Australian Federal Police

Watch The Interview Biography Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, data science, and analytics platforms. His role includes delivering...

How to Outsmart Ransomware and Build Resilience Within Your Organisation

Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, LockBit 3.0 uses a triple extortion strategy, demanding a...

The Strategic Transformation of IT: From Cost Center to Business Catalyst

The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average annual total shareholder returns of 8.1% vs. 4.9% for laggards,...

Mick Dunne – Chief Cybersecurity Advisor at Microsoft

Watch The Interview  Biography Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team bring deep industry experience as former CISOs and CTOs to enable them to work with customers with empathy and understanding of the challenges security...

Leigh Williams – CIO, Brisbane Catholic Education

Watch The Interview  Biography Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and advocator in digital innovation and education, Leigh has led keynotes and workshops around the world on digital transformation. Leigh has experience in...

Command Central: Holistic Control Room Design for Today’s Critical Infrastructure

If you’ve been leading critical infrastructure for a while, you’re no stranger to control rooms. You’ve seen your fair share—some meticulously designed for efficiency, others falling short of expectations. You know the ones: cramped spaces with lighting that’s either too harsh or too dim, screens that clash with the ambience, desks haphazardly arranged, a corner reluctantly repurposed as a managers office, and, of...

Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats

Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet (SOTI) report delivers practical research around risk management to identify, assess, and mitigate threats; how to reinforce network architecture to create...

Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade

Watch The Interview  Biography As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about harnessing the power of Open Source, demonstrated through his leadership roles at OpenUK and the Green Software Foundation. With a unique blend of legal and...

Why Is Energy Monitoring Technology So Important For Achieving Sustainability Goals?

You can’t manage what you don’t measure. So measure we must. This year we see the continued roll out of the Australian Sustainability Reporting Standards (ASRS) and edge even closer to Australia’s 2030 commitment to Net Zero Emissions. It all points to a need for authentic, precision sustainability. And while many organisations are setting ambitious goals (planning for decarbonisation, cleaner electrification or...

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch The Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for B2B tech companies with depth in networking and cybersecurity. Prior to...

The End of Pentest Reporting Chaos: OWASP Standardises the Industry

Background Penetration test reports are one of the most critical security deliverables for organisations, yet the way they are produced and handled has barely changed in decades. Security teams still receive findings in inconsistent, manually formatted reports, often requiring labour-intensive work to extract meaningful insights. The OWASP Penetration Test Reporting Standard (OPTRS) has been created to address this...

2024 Lessons Shaping 2025 Cybersecurity Trends

Introduction Ransomware attacks have continued to progress throughout this year. Groups such as AlphV, LockBit, Hive, and BlackCat are employing advanced tactics to infiltrate systems and conduct lateral movements within networks. The RansomHub attack on Halliburton, in which the company likely incurred losses of approximately $35 million against its billions in earnings, underscores the notion that employee...

Navigating And Combatting Scams In Banking

Australia’s banking sector is dedicated to protecting its customers from sophisticated criminal networks through the Scam-Safe Accord—a globally leading initiative designed to disrupt, detect, and respond to scam activity. This industry-wide commitment unites community-owned banks, building societies, credit unions, and commercial banks under a comprehensive framework of anti-scam measures to strengthen financial...

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing is becoming particularly prominent as generative artificial...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Imagine a scenario where a ransomware attack cripples a hospital’s ventilators, infusion pumps are manipulated to deliver incorrect dosages, or a CT scanner is hijacked to serve as a launchpad for a larger network breach. These are not hypothetical situations; they are real threats that healthcare organizations face today. As medical devices become increasingly interconnected, they also become prime targets for...

What’s New in Microsegmentation in 2025

What’s changed about microsegmentation in 2025? Why does it feel like there’s suddenly a renewed spotlight on this approach? Short answer: because the stakes are higher than ever. It’s no longer just a “nice-to-have” method of tightening your network boundaries. For many organizations, it’s become an operational necessity. Let’s talk about why. Why the “Zero Trust” Playbook Is Everywhere Microsegmentation = Zero...

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was responsible for enterprise-wide digital security and resiliency. Bret...

Under Attack: Exposing Upscale Hacktivist DDoS Tactics

Introduction In November 2024, DDoS attackers launched a campaign targeting Australian websites. It’s not out of the ordinary for Australian sites to be on the receiving end of DDoS attacks. However, this event was unusual, amounting to a surge of over 60 DDoS attacks on 39 different websites during the month. The attacks targeted a range of sectors spanning government, transportation, financial, legal, education...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and ...