No results found.
No results found.
No results found.

Podcasts

Episode 313 Deep Dive: Rose Alvarado & Jenna Eagle | Security Data Pipeline and the Future of SOC
byKBI.Media

In this episode, we sit down with Rose Alvarado, Regional Sales Manager, and Jenna Eagle, Solutions Engineer Lead, from Cribl as they unpack the evolving role of the security data pipeline and the future of the SOC. Rose and Jenna discuss the increasing demand for flexibility and control over data management, highlighting how organizations are moving away from vendor lock-in to gain better cost efficiencies and visibility. They examine the challenges of managing explosive data growth, the shift from traditional SIEM solutions to data pipelines for pre-processing, and the importance of routing high-value data to appropriate platforms.

Rose Alvarado is an accomplished security specialist with more than eleven years of experience in the Australian Enterprise IT industry who partners with CISOs, CIOs and IT Managers to provide them with the best IT security and data solutions that meet their needs. Currently, she is the Regional Sales Manager for NSW at Cribl, helping organisations adopt a better data management strategy, improving their security and observability operations while reducing their cost of ownership. She is passionate about cybersecurity and data management, she constantly seeks to expand her professional skills and learn from industry experts.

Jenna’s cyber journey began at Accenture Federal Services, where she collaborated with U.S. federal agencies on mission-critical projects. She then transitioned to Splunk as a Public Sector Solutions Engineer, specializing in compliance, automation, and IT and security modernisation. Now, as a Solutions Engineering Manager for ANZ at Cribl, she helps organisations take control of data growth through optimisation, data tiering, and breaking vendor lock-in. When she’s not “Cribbling,” you’ll find her exploring her new home in Australia or spending time with her American Bulldog.

No results found.
Active Subscription Scam Campaigns Flooding the Internet

Active Subscription Scam Campaigns Flooding the Internet

Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken to make these fake sites look convincingly legitimate. Gone are the days when a suspicious email, SMS, or basic phishing link could easily fool users. As people grow more cautious and cyber-aware, scammers are stepping up their game. They have already begun crafting more complex and ...
No results found.

Business News ↓

How a Veteran Project Manager Tames Cyber Chaos

Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a guest a special guest Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity. Natalie’s reflection on the challenges of delivering cyber projects in the high-speed project delivery world. Despite investment in...

How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) technology. techniques. Our team at...
What Makes You Board Ready? cover

What Makes You Board Ready?

Serving on a corporate board is often seen as the pinnacle of a professional career, the natural, coveted ‘next step’ after decades of climbing the corporate ladder. For many, it is the picture of executives in sharp suits, convening in a high-rise building, and making decisions that shape industries and economies. But beneath these ‘glamour’ and ‘prestige’ lies a more important question: Why do you want to be...

Why Australian Boards Need to Rethink Risk in the Age of AI

Introduction The nature of corporate risk in Australia is evolving rapidly at a strategic, reputational, and liability level. As the next five years shape up to be even more disruptive in the world of risk management, Australian boards need to begin paying swift attention not only to how artificial intelligence (AI) is going to reshape the risk environment itself, but also how AI can assist them in combatting and...

Shadow Data Is The New Insider Threat: What CISOs Overlook In SaaS Sprawl

Companies maintain internal databases for sensitive information. However, sometimes employees want to take work home or believe it is easier to save files on their systems. These seemingly minor and understandable oversights introduce a new and growing threat to all industries: Shadow Data. Typical security protocols do not address these scenarios, leading to unexpected gaps and increased risk of breach. A New Kind...

The New Priorities Driving Organisations To Uplift Web Application Security

While compliance ensures steady improvements to application security, the cadence of upgrades is not enough to meet best practice or evolving customer expectations. Internet-based applications might run the digital world, but their security is an ever-present concern, and the consensus is that more needs to be done, and fast, to build (or rebuild) a foundation of trust. Modern digital experiences are powered by...

Can Cyber Security Be a Platform for Innovation and Growth?

Introduction The rapidly evolving cyber-risk landscape sees a cyber attack every six minutes in Australia, with a new wave of threats enabled by AI.1 The ability to manage cyber risks whilst at the same time delivering technological transformation places CISOs and CTOs in the driver’s seat of fast, sustainable organisational growth. This concept, known as "cyber agility," is the foundation of resilient and adaptive...

Digitally Marked: Australia’s Sensitive Position in the Global Cyberwar

Strategic advisor at Semperis, Simon Hodgkinson, discussed the ongoing state-sponsored cyberattacks, particularly in Australia. With decades of experience as a cybersecurity leader in software, financial services, and energy industry, Hodgkinson shared valuable perspectives and reflected on previous incidents, highlighting hard-learned lessons and best practices. His message is clear: cyber conflict is no longer a...
Qualys Names New Managing Director for Australia And New Zealand cover

Cyber Risk is Business Risk: Qualys Calls For Strategic Shift During Global Cybersecurity Week

This Global Cybersecurity Week is a timely reminder that cyber risk is no longer a technical issue – it’s a business imperative.   As threat actors move faster and AI amplifies the speed and precision of attacks, organisations must evolve how they manage and reduce risk over time. The era of “patch when you can” is over. Traditional, reactive vulnerability management is no longer fit for purpose.  To stay ahead,...

How Adopting Maturity Models Can Improve Enterprise IT Security

Introduction With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices. Essentially, organisations can align their processes with one of two global industry standards for self-assessment and security maturity. The first is the Building Security...

Why Web Application Firewalls are a Critical Shield for Fintech Security

As digital banking, fintech innovations, and mobile transactions continue to reshape the global financial landscape, cybersecurity threats have become increasingly sophisticated. The financial sector, being the backbone of the global economy, is a prime target for cyberattacks. As organisations adopt cloud-based services, digital transactions, and third-party integrations, they introduce new security...

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this isn’t a job interview, so let’s not make it sound like a LinkedIn...

Data Management – It’s A High-stakes Game

In today’s digital-first economy, data can be both a powerful asset and a significant liability. Companies that proactively manage their data can achieve multiple positive business outcomes such as making optimal use of their storage infrastructure while simultaneously servicing next-generation workloads such as GenAI. Those that fail to act run the risk of spiralling costs in addition to large exposure in the case...

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers paint a stark picture of a rapidly evolving threat landscape that...

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The interconnectedness of global financial markets and digital...

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and storage infrastructure spend. Cloud environments have grown in...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Enhancing Software Development the EveryOps Way

Software has become the undisputed driver of business today. As the reliance on software has grown, so have the moving parts needed to make it, especially amid the rise of generative artificial intelligence (GenAI). As a result, software development has become a complex process, potentially hampering innovation.  According to Deloitte, GenAI usage in Australian workplaces grew 20% from 2023 to 2024, with 38% of...
The Blur Between Cloud, OT, and Critical Infrastructure cover

The Blur Between Cloud, OT, and Critical Infrastructure

Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure. With recent news out of the US and Australia about the US regulatory crackdown on Chinese smart vehicle tech due to national security concerns, versus Australia’s more open arms of electric...
What in the Cloud? cover

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each brings to the table and where they fall short. So let’s take a look...

How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) technology. techniques. Our team at...
No results found.
No results found.
No results found.
No results found.
No results found.
What in the Cloud?

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. ...
No results found.
No results found.
No results found.
No results found.