Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity

Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity

In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances. Small to medium sized players have been under particular pressure, according to accountancy firm Grant Thornton’s The State of Australian Manufacturing: 2023 Manufacturing Benchmarks "…Cash flows have been heavily impacted by rising costs, inflationary pressures, and disruptions in supply chains. This has mainly affected manufacturers with turnovers ...

Business News ↓

2024 Cybersecurity Predictions from CyberArk

Over 2023, we’ve seen what I like to call the ‘verticalisation of cybersecurity’ taking effect, in that cybersecurity has finally taken centre stage in business discussions. If you see event agendas for example, it is now featured as a key business conference topic at any industry event – whether it is a healthcare fest or a mining conference. As discussed in my predictions last year, cybersecurity’s impact on...

2024 Cybersecurity Predictions by Qualys

Reflecting on the past year, we've witnessed a notable transformation in how organisations perceive and prioritise their cybersecurity strategies, largely driven by evolving perspectives on its significance, impact and value it has from a business perspective, compounded by the influence of government-led legislations that emphasize compliance.   However, as we cast our gaze forward to 2024, as the cybersecurity...

A Skills Shortage Should Not Define An Organisation’s Cybersecurity Posture

Australia remains in the midst of a skills shortage, with slow hiring conditions occurring across the nation. Topping the most desired positions are cybersecurity professionals, according to recruiter Hays’ Salary Guide. With the increasing significance cybersecurity has within organisations this doesn’t come as a surprise, however business leaders should not accept gaps in security as they wait for hiring to...

Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using information about your existing customers and curating a pipeline...

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

In recent years, the internet has become a breeding ground for toxicity. People are more emboldened online, hiding behind pseudonyms and expressing their more divisive and extreme views. This has resulted in a lack of constructive debate and a prevalence of insults and memes. Social media, which was supposed to be a platform for connection and shaping opinions, has instead led to people doubling down on their own...

The Unspoken Voice – CFOs Perspective On Security

The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial implications extend beyond immediate stock price drops, affecting...

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, facilitated by blockchain, introduces a host of cybersecurity...

Can Being “Compliant” Ever Top Being “Secure”?

In a 2016 case involving the North Korean-based Lazarus Group and the Federal Reserve Bank of New York it did. As a result of following compliance procedures related to red flags on an address, the Federal Reserve Bank of New York blocked $850 million USD from being diverted to attackers who had compromised the central bank of Bangladesh and used the interconnected and encrypted global banking network (known as...

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity. The past year was defined by some remarkable technological advancements, especially in the realm of Artificial Intelligence (AI), and this has set the stage for what is to come. The next 12 months are likely to see a complex mix of both innovation and...

Unlocking Opportunities: Australian Talent in the US Job Market

In a recent episode of the KBKast podcast, host Karissa Breen sat down with Amy Meyer, an Australian expat who has successfully carved out a career in the United States. The conversation touched upon the unique challenges faced by Australians seeking employment in the US and the strategies to position themselves for success. Skills And Value One of the key topics discussed was how Australian job seekers can...

Soczilla Roadshow Launches in Australia and New Zealand

Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney. The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the Palo Alto Networks team including Shailesh Rao, President, Cortex at...

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

Atlanta, GA – October 31, 2023 – BeyondTrust, the worldwide leader in intelligent identity and access security, today released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections, authored by BeyondTrust experts Morey J. Haber, Chief Security Officer; Christopher Hills, Chief Security Strategist; and James Maude, Director of Research, are based on shifts in...

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply. According to industry estimates, the number of cybersecurity job vacancies globally has grown to 3.5 million, up from 1 million in 2013. In Australia, it is estimated vacancies could reach 30,000 by 2026.  These...

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.  NEWS HIGHLIGHTS The global study reveals that 61% of those surveyed are concerned that their organisation will not be prepared to address the security implications of PQC. 74% of organisations are concerned that bad...

Four steps organisations can take to improve cybersecurity awareness

October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).1 Unfortunately, this number is expected to climb even higher in 2023,...

The overlap between physical and digital security – how to get smart with compliance

Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of sensitive data from surveillance footage, photos, and licence plate...
Episode 166: Jane Frankland

Episode 166: Jane Frankland

Jane Frankland is an award-winning leader, best-selling author, speaker and change agent. Through her company, ...
Episode 138: Nicholas Boyle

Episode 138: Nicholas Boyle

Nick Boyle is a partner in the IP & Technology team at DLA Piper, and is based in Sydney. He advises clients on data ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

2024 Cybersecurity Predictions from CyberArk

Over 2023, we’ve seen what I like to call the ‘verticalisation of cybersecurity’ taking effect, in that cybersecurity has finally taken centre stage in business discussions. If you see event agendas for example, it is now featured as a key business conference topic at any industry event – whether it is a healthcare fest or a mining conference. As discussed in my predictions last year, cybersecurity’s impact on...

Phishing-Resistant MFA Helps Businesses Reduce Risk And Costs In The Face Of A Rapidly Changing Cyber Insurance Landscape

To address and insulate themselves from the growing trend of cyber security breaches, more businesses are turning to insurance agencies for cyber insurance policies. While these policies have been around in some form since the late 1990s, the fast growing threat landscape and comparative youth of these policies means that rates and limits have fluctuated wildly as underwriters attempt to understand the risks and...

Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using information about your existing customers and curating a pipeline...

SailPoint completes IRAP Assessment, empowers Australian government agencies to automate and secure access to critical data and resources

Australia, 14 November 2023 – SailPoint Technologies, Inc., a leader in enterprise identity security, announced today that it has successfully completed the Information Security Registered Assessors Program (IRAP) assessment for SailPoint Identity Security Cloud which leverages artificial intelligence (AI) and machine learning (ML) technologies to automate complex identity security processes, therefore reducing...

Can Being “Compliant” Ever Top Being “Secure”?

In a 2016 case involving the North Korean-based Lazarus Group and the Federal Reserve Bank of New York it did. As a result of following compliance procedures related to red flags on an address, the Federal Reserve Bank of New York blocked $850 million USD from being diverted to attackers who had compromised the central bank of Bangladesh and used the interconnected and encrypted global banking network (known as...

A Look Inside a Cybercriminal Execution Chain

During a cyber attack, the process of compromising a machine rarely involves a single step. Instead, the chain of execution not only involves multiple events, but also a continuous evolution of attacking patterns, making it increasingly difficult to identify the malicious actions involved. For example, an execution chain often begins with a phishing email including attachments or links which, when opened, execute a...

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity. The past year was defined by some remarkable technological advancements, especially in the realm of Artificial Intelligence (AI), and this has set the stage for what is to come. The next 12 months are likely to see a complex mix of both innovation and...

Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity

In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances. Small to medium sized players have been under particular pressure, according to accountancy firm Grant Thornton’s The State of Australian Manufacturing: 2023 Manufacturing Benchmarks "…Cash flows have been heavily...

The Social Responsibility of Data Security

Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, family, and loved ones. The Risks As data becomes more critical in...

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

Atlanta, GA – October 31, 2023 – BeyondTrust, the worldwide leader in intelligent identity and access security, today released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections, authored by BeyondTrust experts Morey J. Haber, Chief Security Officer; Christopher Hills, Chief Security Strategist; and James Maude, Director of Research, are based on shifts in...

The Security Threat Posed by ‘Zombie’ APIs

Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs). The challenge of ‘zombie APIs’ was highlighted in the recent State of API Security Q1, 2023 report1 issued by US-based Salt Labs. The report...

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment (PPE) during the COVID-19 Pandemic, as too have logistics firms...

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices worldwide, each of which will require a data connection to operate and...

PAM may be the infosec pressure relief valve Australia’s finance sector needs

An Overview If there’s one thing regulated entities don’t want to hear from their regulator, it’s that they’re “rapidly running out of patience” with the sector’s slow progress on a mandate or directive. Yet that’s exactly where Australia’s financial sector finds itself with respect to its progress on information security. A July “cyber stocktake” run by the Australian Prudential Regulation Authority (APRA) exposed...

Five common challenges with securing cloud-based applications

The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.   Part of the attractiveness of shifting to the cloud is that it ushers in a more modular approach to building applications. This enables development and operations teams to create and deploy feature-rich apps very quickly.    However, the same...

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools like ChatGPT to trade stocks and make investment decisions....
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...
Virtual Patching

Virtual Patching

Scenario 1:MyBank Pty Ltd has 300+ critical legacy enterprise applications. Almost all of them were built by the then ...