Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability.ย Itโ€™s a โ€˜double-edged swordโ€™ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it also opens the door for innovative cyber threats. Indeed, this โ€œtransformative and dualistic shiftโ€ presents unprecedented challenges and opportunities and is sparking calls for regulatory measures to ...

Podcasts

Episode 283 Deep Dive: John Hare | How AI Shapes the Future of Corporate Security
byKBI.Media

โ€œThe views reflected in this podcast are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.โ€

In this episode, we sit down with John Hare, Associate Partner, Cyber Security from EY as he discusses the latest EY research on what those organisations that achieve the best security outcomes (โ€œSecure Creatorsโ€) do differently to their less secure peers (โ€œProne Enterprisesโ€).

We also explore how Secure Creators are responding to the recent surge in AI and GenAI use โ€“ both in the cyber function (AI for Cyber) and throughout the enterprise (Cyber for AI). John provides insights into how AI presents an opportunity for astute cyber teams to cement themselves as the true enablers of technology transformation, rather than โ€œthe department of noโ€.

Johnย has 25 years of professional experience, spanning cybersecurity, diplomacy and law.ย Johnย began his career as an M&A lawyer in London and Tokyo, before serving as a British diplomat for 9 years.ย Johnย has spent the last decade working on cybersecurity, as a consultant, inside a major bank, and as a regional executive for a technology company.

Johnย advises Australiaโ€™s leading financial services organisations on their cybersecurity strategies, adopting global better practice, and making cybersecurity a value creation driver.

ย 

Articles:

Cybersecurity an AI accelerator across the business | EY โ€“ Global
Cyber and privacy leadersโ€™ agenda | EY โ€“ Global

Listen to Decrypting The Future episodes here.

Business News โ†“

Why Microsegmentation is the Key to Containing Breaches in Todayโ€™s Cybersecurity Landscape

The Rise of Breach Readiness in Modern Cybersecurityย  Businesses today are navigating an increasingly complex digital environment where cyber threats evolve relentlessly. In recent years, cybersecurity has transformed from a niche technical concern to a strategic priority that sits firmly on the boardroom agenda. The rapid rise in the sophistication of cybercrime has left organizations grappling with how best to...

Navigating Cybersecurity Decision-making In The Age Of AI: Insights Into Operational, Tactical, And Strategic Influences

KBI Media is bringing you a preview of presentations from the upcoming Australian Cyber Security Conference in Melbourne. On 28 November 2024, Dr Ivano Bongiovanni, General Manager, AUSCERT will be unveiling insights from cutting edge research to unpack how decisions are being made in cybersecurity Dr Bongiovanni recently undertook research to discover what are the driving factors that influence cybersecurity...

Why Breaking Down Identity Silos Has Become An Imperative For Business

Many businesses today rely on hybrid IT environments that integrate a complex array of applications, datacentres, and cloud services. While these diverse ecosystems offer flexibility, they also present a critical challenge: identity silos. Fragmented identity and access management (IAM) creates security vulnerabilities, reduces efficiency, and raises operational costs. To mitigate these risks, organisations need a...

Post-Quantum Cryptography And Compliance: Where Are We Now?

As quantum computing continues to advance, its implications for cybersecurity are increasingly apparent. Quantum technology has the potential to disrupt widely used cryptographic protocols, exposing sensitive information to new vulnerabilities. In response, governments and regulatory bodies worldwide are urging organisations to adopt quantum-safe measures to protect data against future quantum threats. Post-Quantum...

Cybersecurity Shortfalls Threaten Australia’s Push to Boost Tech Exports

Introduction Australian policymakers are converging on a few challenging issues simultaneously. With a growing population and the tail end of an inflation outbreak, the housing crisis seems set to persist, affecting affordability for years to come. In this context, finding solutions to foster economic stability and growth is crucial. One viable path to address these challenges is through high-productivity jobs that...
NetApp's Innovation Unveiled. Key Areas Driving the Future of Data Management - Security is a Priority. cover

N-Powered Change – What Can We Learn from NetApp INSIGHT 2024

NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise systems, and in the development of cyber resilience. The conference highlighted NetAppโ€™s innovative strides in building an interconnected data...

Overcoming Common Security Vulnerabilities In The Banking Sector

For as long as banks and financial institutions have existed, so too have those seeking to steal from them. The infamous bank robber Willie Sutton, active in the 1920s, famously quipped that he targeted banks โ€œbecause thatโ€™s where the money is.โ€ While the methods have evolved since Suttonโ€™s time, the motivation remains largely the same. Today, the vast majority of wealth in these institutions is digital, and the...

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments

Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications. Australian enterprises of all types have grown accustomed to running their application estates on virtualised server infrastructure. The trend towards server virtualisation grew out of a desire to reduce physical server sprawl, power costs and requirements for data centre space. This...

Cybercrime Is Soaring: Is Your Business Ready To Respond?

As cybercrime reaches unprecedented levels, the urgency for businesses to bolster their defences is strong. A report from Cybersecurity Ventures[1] predicts that global cybercrime costs will soar to $10.5 trillion annually by 2025, marking a 15% growth per year. This growth represents one of the largest transfers of economic wealth in history. In this climate, businesses must move beyond traditional security...

Are Aussie Networks Future-fit?

Introduction According to IDCโ€™s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of todayโ€™s digital economy. Some might say thatโ€™s an alarming statistic. And yet my experience is that many Aussie enterprises are stuck in an ad-hoc or resistant technology mindset thatโ€™s stopping them from becoming...

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, hackers exploit these platforms to trick users into downloading harmful...

Revolutionising Government with a Modular, AI-Driven Platform

For Context As Australiaโ€™s three levels of government undergo a digital transformation, meeting the increasing demand for efficient, citizen-centric services is critical. Technology plays a central role in this transformation, enabling governments to better connect with their citizens while maintaining compliance and digital trust. But rather than focusing solely on low-code, the real value lies in platforms that...

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if production data is compromised due to a breach or internal error,...

Ensuring Secure Content in the Era of Digital Transformation

Introduction In todayโ€™s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially. ย  As creating and sharing documents from anywhere continue to evolve, making reliable and secure communication has become...

Boosting Software Security With a Binary Approach

Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the worldโ€™s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters. The access token, discovered by the JFrog Security Research team in July, had administrator access to Pythonโ€™s, PyPIโ€™s and...

Krish Vitaldevara – Senior Vice President and General Manager

Watch The Interview Biography Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions of consumers. Krish is the SVP for Shared Platform at NetApp, responsible for unified storage platform, manageability platform, Customer eXperience...
๏‚€

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News โ†“

Why Microsegmentation is the Key to Containing Breaches in Todayโ€™s Cybersecurity Landscape

The Rise of Breach Readiness in Modern Cybersecurityย  Businesses today are navigating an increasingly complex digital environment where cyber threats evolve relentlessly. In recent years, cybersecurity has transformed from a niche technical concern to a strategic priority that sits firmly on the boardroom agenda. The rapid rise in the sophistication of cybercrime has left organizations grappling with how best to...

Why Breaking Down Identity Silos Has Become An Imperative For Business

Many businesses today rely on hybrid IT environments that integrate a complex array of applications, datacentres, and cloud services. While these diverse ecosystems offer flexibility, they also present a critical challenge: identity silos. Fragmented identity and access management (IAM) creates security vulnerabilities, reduces efficiency, and raises operational costs. To mitigate these risks, organisations need a...
NetApp's Innovation Unveiled. Key Areas Driving the Future of Data Management - Security is a Priority. cover

N-Powered Change – What Can We Learn from NetApp INSIGHT 2024

NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise systems, and in the development of cyber resilience. The conference highlighted NetAppโ€™s innovative strides in building an interconnected data...

Countering Healthcare Cyber Threats

Introduction Cyberattacks in the healthcare industry are surging at an unprecedented rate, with fresh breaches making headlines nearly every day. Data from the U.S. Department of Health and Human Services (HHS) shows that major healthcare data breaches have seen a twofold increase over the last four years, affecting more than 88 million people in 2023โ€”an alarming 60% rise compared to 2022. In the first six months...
Are Aussie Networks Future-fit?

Are Aussie Networks Future-fit?

According to IDCโ€™s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies ...
Are Aussie Networks Future-fit?

Are Aussie Networks Future-fit?

According to IDCโ€™s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies ...