Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the United Kingdom, and Australia - as well as other close allies around the world. At BOKA, the goal reaches beyond just providing essential funding to foster growth of the companies they invest in. The group also brings extensive knowledge, expertise, and experience to supercharge that ...

Podcasts

Episode 288 Deep Dive: Venkat Balakrishnan | Platformisation And Solving The Real Problem
byKBI.Media

In this episode, we sit down with Venkat Balakrishnan, CISO from TAL Australia, as he discusses the evolving concept of platformization in cybersecurity. Venkat explores how consolidating various cyber functions and tools into single platforms can drive efficiencies, reduce costs, and simplify management efforts. He emphasizes the maturity of network security and endpoint security operations as key areas ready for platformization, while also discussing the fragmented nature of identity and access management.

Venkat is an experienced cyber security and technology risk executive with expertise in building cyber resilience, safely enabling business growth and inspiring customer trust. Adept in building relationships and influencing stakeholders at all levels across organisations with strong customer focus to deliver pragmatic and innovative solutions to derive business value. Passionate people leader with demonstrated success of developing diverse and high performing teams. Experienced in building security practices from grassroots with innovative approaches for modernisation and by accelerating into scalable and sustainable operations.

Business News โ†“

Protecting Data from Ransomware: The Power of Advanced Encryption

Introduction Ransomware has evolved from a disruptive nuisance to a sophisticated cyber threat capable of crippling businesses. What was once a single extortion tacticโ€”locking a companyโ€™s files and demanding payment for their releaseโ€”has now become a dual threat. Attackers not only lock access to critical systems but also steal sensitive data, threatening to expose it unless a ransom is paid. This double extortion...

Tackling Takedowns – How To Mitigate Risks of Fake Domains

Introduction Every year, more and more Australian companies are confronted with website and email spoofing worldwide. The recent Annual Cyber Threat Report 2023-2024 revealed that the Australian Signals Directorateโ€™s Domain Takedown Service made more than 189,000 requests for removals, up 49% from the previous year. Cyber criminals use fake websites and fake email accounts for phishing, spear phishing and social...

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

At the Art of Play with my youngest some time back, I was reminded how covering things up only masks the problem. It got me thinking about the art of mastering cyber risk. Disconnected governance, incomplete controls or sheer technology complexity can mask the risk lurking beneath the surfaceโ€”untreated and potentially catastrophic. Critical Infrastructure organisations are under increasing pressure to manage...

Cybersecurityโ€™s Evolution And The Shift Toward Secure-By-Design Principles

In the ever-changing landscape of cybersecurity, experts are increasingly advocating for Secure-by-Design principles to address the accelerating challenges of todayโ€™s digital world. The concept emphasises embedding security into software from the beginning of the development process in a shift that reflects a significant maturation of the cybersecurity industry. Cybersecurityโ€™s early days were dominated by the...

Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

By Ashwin Ram, Evangelist, Office of the CTO, Check Point Software Technologies Australia & New Zealand The latest report from the Office of the Australian Information Commissioner (OAIC) reveals a troubling trend that boards can no longer afford to ignore: 527 data breaches in just six months - an alarming nine per cent increase for the period of January to June 2024. With high-profile brands such as Medibank,...

2025 Cybersecurity Predictions By Qualys

1. Prediction: The increasing use of AI will not alter the basics of cybersecurity strategies ย  โ€œWhile several enterprises are looking for the next best AI solution in an effort to fight fire with fire, I am reminded of the famous Alphonse Karr quote, โ€œThe more things change, the more they stay the same.โ€ As such, a better question is, โ€œWhat do businesses stand to lose (i.e. what is the value at risk) from AI abuse...

How Breach Readiness Will Shape Cyber Defense In 2025

Let me start by wishing everyone Happy Holidays and a great new 2025 ahead. As we exit 2024, I am equally hopeful and worried about the year ahead. While I am concerned that even increased spending on cybersecurity has not slowed down cyberattacks, with increased interest in breach readiness and cyber defense, I am hopeful that the industry will focus on reducing opportunities to a large extent. In 2024, as I...

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability toย employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to emulate voices on the telephone. They might impersonate a family...

When Post-Quantum Cryptography Is No Longer Post-Quantum

In an era where quantum computing edges closer to practicality, the cryptographic protocols we rely on must evolve to meet emerging challenges. Post-Quantum Cryptography (PQC) represents a proactive step towards safeguarding sensitive information against quantum-powered threats. However, as with any technology at the frontier of innovation, PQC standards are not set in stone. The Changing Face of PQC Standards The...

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company data.(2) This rise in cyber incidents translates into significant...

Antifragility – The Essential Strategy for Modern Cyber Defense

This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which addresses fundamental issues of randomness, probability, complexity, and uncertainty, is not only critical for risks in financial planning and life in general but is also very relevant to the context...

The Five Step Journey To Securing Australiaโ€™s Most Important Data Assets

Financial institutions are leading the way in their pursuit of adaptive protections against evolving information-stealing threats. Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and...

AI’s Transformative Role In Corporate Governance

Introduction Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, managing risks, and ensuring compliance. The opportunity...

Secure-By-Design Is A Significant Exercise, But The Rewards Are Significant, Too

Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation. The idea of baking security into software right from the start of the development lifecycle is going from strength to strength, having gained important buy-in from cybersecurity agencies and vendors in the past year. Over 250 vendors supplying the US government have now signed a...

Cloud-Based Post-Quantum Cryptography (PQC) vs Local PQC: Not as Straightforward as You’d Think

Introduction As the quantum computing era approaches, organisations must adopt Post-Quantum Cryptography (PQC) to safeguard their data against future quantum threats. A critical decision in this transition is whether to implement PQC through cloud-based services or rely on local deployment. Each approach offers distinct advantages and challenges, and the right choice depends on the organisationโ€™s specific needs,...

Claroty 2025 Cyber Security Predictions

The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an act of war from their enemies. Proposed legislation to protect...
๏‚€

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News โ†“

Protecting Data from Ransomware: The Power of Advanced Encryption

Introduction Ransomware has evolved from a disruptive nuisance to a sophisticated cyber threat capable of crippling businesses. What was once a single extortion tacticโ€”locking a companyโ€™s files and demanding payment for their releaseโ€”has now become a dual threat. Attackers not only lock access to critical systems but also steal sensitive data, threatening to expose it unless a ransom is paid. This double extortion...

Tackling Takedowns – How To Mitigate Risks of Fake Domains

Introduction Every year, more and more Australian companies are confronted with website and email spoofing worldwide. The recent Annual Cyber Threat Report 2023-2024 revealed that the Australian Signals Directorateโ€™s Domain Takedown Service made more than 189,000 requests for removals, up 49% from the previous year. Cyber criminals use fake websites and fake email accounts for phishing, spear phishing and social...

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

At the Art of Play with my youngest some time back, I was reminded how covering things up only masks the problem. It got me thinking about the art of mastering cyber risk. Disconnected governance, incomplete controls or sheer technology complexity can mask the risk lurking beneath the surfaceโ€”untreated and potentially catastrophic. Critical Infrastructure organisations are under increasing pressure to manage...

Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Australia is leading the charge in digital payments, with mobile wallet transactions skyrocketing to $126 billion in 2023โ€”a staggering 169-fold increase since 2018, according to the Australian Banking Association (ABA). But as the relentless wave of digitisation transforms payment systems, many financial institutions, particularly smaller ones, are struggling to keep pace in other critical areas of IT, especially...