A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For the legal community, there is something for everyone: migration law, procurement, consumer, corporate and commercial, in-house, and of course government. For those hoping the Strategy would provide ...

Podcasts

Episode 281 Deep Dive: Yuri Miloslavsky | Risks of Digital Footprint in Information Sharing
byKBI.Media

In this episode, we sit down with Yuri Miloslavsky, CEO of Sharepass, as he discusses the risks associated with digital footprints in information sharing. Yuri delves into the importance of awareness about the vulnerabilities introduced by our online activities and the challenges of balancing security with user convenience. We explore the cybersecurity industryโ€™s need to simplify security processes like multi-factor authentication (MFA) to enhance user adoption, and the pivotal role of education in improving security practices. Yuri also addresses corporate privacy policies, the trade-off between convenience and security, and the necessity for tighter compliance and regulation to ensure transparent data management.

Yuri Miloslavsky is an IT professional and entrepreneur with over 15 years of experience in the industry. As the co-founder and CEO of SharePass, a cutting-edge digital footprint management and privacy protection platform, Yuri is at the forefront of developing secure solutions for the modern digital communication landscape. His expertise extends to building and running a successful Managed Service Provider (MSP) specializing in IT consulting and cloud services.

Business News โ†“

NetApp's Innovation Unveiled. Key Areas Driving the Future of Data Management - Security is a Priority. cover

N-Powered Change – What Can We Learn from NetApp INSIGHT 2024

NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise systems, and in the development of cyber resilience. The conference highlighted NetAppโ€™s innovative strides in building an interconnected data...

Overcoming Common Security Vulnerabilities In The Banking Sector

For as long as banks and financial institutions have existed, so too have those seeking to steal from them. The infamous bank robber Willie Sutton, active in the 1920s, famously quipped that he targeted banks โ€œbecause thatโ€™s where the money is.โ€ While the methods have evolved since Suttonโ€™s time, the motivation remains largely the same. Today, the vast majority of wealth in these institutions is digital, and the...

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments

Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications. Australian enterprises of all types have grown accustomed to running their application estates on virtualised server infrastructure. The trend towards server virtualisation grew out of a desire to reduce physical server sprawl, power costs and requirements for data centre space. This...

Cybercrime Is Soaring: Is Your Business Ready To Respond?

As cybercrime reaches unprecedented levels, the urgency for businesses to bolster their defences is strong. A report from Cybersecurity Ventures[1] predicts that global cybercrime costs will soar to $10.5 trillion annually by 2025, marking a 15% growth per year. This growth represents one of the largest transfers of economic wealth in history. In this climate, businesses must move beyond traditional security...

Are Aussie Networks Future-fit?

Introduction According to IDCโ€™s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of todayโ€™s digital economy. Some might say thatโ€™s an alarming statistic. And yet my experience is that many Aussie enterprises are stuck in an ad-hoc or resistant technology mindset thatโ€™s stopping them from becoming...

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, hackers exploit these platforms to trick users into downloading harmful...

Revolutionising Government with a Modular, AI-Driven Platform

For Context As Australiaโ€™s three levels of government undergo a digital transformation, meeting the increasing demand for efficient, citizen-centric services is critical. Technology plays a central role in this transformation, enabling governments to better connect with their citizens while maintaining compliance and digital trust. But rather than focusing solely on low-code, the real value lies in platforms that...

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if production data is compromised due to a breach or internal error,...

Ensuring Secure Content in the Era of Digital Transformation

Introduction In todayโ€™s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially. ย  As creating and sharing documents from anywhere continue to evolve, making reliable and secure communication has become...

Boosting Software Security With a Binary Approach

Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the worldโ€™s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters. The access token, discovered by the JFrog Security Research team in July, had administrator access to Pythonโ€™s, PyPIโ€™s and...

Krish Vitaldevara – Senior Vice President and General Manager

Watch The Interview Biography Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions of consumers. Krish is the SVP for Shared Platform at NetApp, responsible for unified storage platform, manageability platform, Customer eXperience...

Generative AI for Cybersecurity – Is It Right For Your Organisation?

Introduction The arrival of generative AI and its seemingly endless possibilities also came with a myriad of sophisticated threats. And as organisations move to increasingly complex digital environments and struggle to analyse the exponential growth of security data, SIEM solutions are evolving to harness the power of generative AI. Yet, given the potential risks, many businesses are stuck on the question: to...

Sandeep Singh – Senior VP and GM, Enterprise Storage

Watch The Interview Biography Sandeep Singh is Senior Vice President and General Manager, Enterprise Storage at NetApp. Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building innovative products, managing high-performance organizations, and delivering business results at startups and Fortune 500 technology companies. Prior to...

Haiyan Song – EVP & GM, CloudOps

Watch The Interview Biography Haiyan Song is EVP & GM, CloudOps @ NetApp. Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. Haiyan has held several leadership roles throughout her career tenure,...

Ashish Dhawan – SVP/GM and Chief Revenue Officer, Cloud Business Unit

Watch The Interview Biography Ashish Dhawan is NetAppโ€™s Senior Vice President of Global Cloud Sales. At the helm of NetApp's Cloud Business Unit as the Senior Vice President, General Manager, and Chief Revenue Officer, his focus is on driving growth through transformative cloud and AI solutions. With a background in leading AWS's Enterprise Workloads business, his expertise lies in accelerating innovation and...

Gagan Gulati – General Manager, Data Services, NetApp

Watch The Interview Biography Gaganโ€™s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security and compliance company where he helped guide the vision, strategy, and...
๏‚€

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News โ†“

NetApp's Innovation Unveiled. Key Areas Driving the Future of Data Management - Security is a Priority. cover

N-Powered Change – What Can We Learn from NetApp INSIGHT 2024

NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise systems, and in the development of cyber resilience. The conference highlighted NetAppโ€™s innovative strides in building an interconnected data...

Countering Healthcare Cyber Threats

Introduction Cyberattacks in the healthcare industry are surging at an unprecedented rate, with fresh breaches making headlines nearly every day. Data from the U.S. Department of Health and Human Services (HHS) shows that major healthcare data breaches have seen a twofold increase over the last four years, affecting more than 88 million people in 2023โ€”an alarming 60% rise compared to 2022. In the first six months...

Are Aussie Networks Future-fit?

Introduction According to IDCโ€™s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of todayโ€™s digital economy. Some might say thatโ€™s an alarming statistic. And yet my experience is that many Aussie enterprises are stuck in an ad-hoc or resistant technology mindset thatโ€™s stopping them from becoming...

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, hackers exploit these platforms to trick users into downloading harmful...
Are Aussie Networks Future-fit?

Are Aussie Networks Future-fit?

According to IDCโ€™s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies ...