Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it also opens the door for innovative cyber threats. Indeed, this “transformative and dualistic shift” presents unprecedented challenges and opportunities and is sparking calls for regulatory measures to ...

Podcasts

Episode 279 Deep Dive: Mary D’Angelo | The Power of Dark Web Threat Intelligence
byKBI.Media

In this episode, we sit down with Mary D’Angelo, Cyber Threat Intelligence Solutions Lead from Filigran, to explore cyber threat intelligence. Mary dives into the challenges of decision-making fatigue and discusses the essential role of integrating threat intelligence across organizational silos. She emphasizes the importance of a top-down cultural shift, advocating to demonstrate threat intelligence’s ROI to C-level executives. Highlighting real-world examples, such as the LockBit ransomware attacks on US hospitals, Mary reinforces the urgent need to democratize and streamline intelligence sharing. She also discusses the potential of AI in improving threat intelligence processes while noting the necessity for human oversight in decision-making.

Mary D’Angelo is a Dark Web Threat Advisor dedicated to empowering organizations with the knowledge and tools needed to effectively combat cyber threats. With a strong focus on threat intelligence, Mary guides businesses in leveraging advanced security strategies to thwart malicious actors.

Her commitment to raising awareness about cybersecurity risks is evident through her extensive work, including insightful interviews and thought-provoking blog posts aimed at educating the public.

Mary holds a Bachelor’s degree from the University of Washington. Actively engaged in the InfoSec community, Mary is a familiar face at industry events, contributing her expertise and staying abreast of emerging trends.

Beyond her professional endeavors, Mary is deeply invested in nurturing the next generation of cybersecurity professionals. She dedicates time to mentoring university students, sharing invaluable insights and guiding them toward successful careers in the field.

Mary’s influence extends beyond traditional realms, as she actively participates in esteemed think tanks such as the Dagstuhl Seminar 2024 and the Tortora Bradya Institute. Through collaborative efforts with leading experts, Mary continues to shape the discourse and advance cybersecurity strategies on a global scale.

Business News ↓

How CISOs Are Getting Developers to Put Security First

Having to constantly measure return on investment (ROI) is the bane of many executives’ lives. For CISOs, the key challenge is proving the business value and effectiveness of cybersecurity efforts. For years, many CISOs have struggled to educate their developers about the importance of putting security first. They’ve also been working to control an increasingly complex threat landscape and spiralling attack...

Cloudflare Helps Secure the World’s Most Popular Messaging Applications

Cloudflare and WhatsApp partner to pioneer a third-party security audit on Key Transparency technology Sydney, Australia, September 24, 2024 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. When using end-to-end encryption messaging applications, a...

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Anna Perez, business development manager, Wavelink and Connected Health  Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; it’s about upholding patient trust and safeguarding their wellbeing. In June 2024, the Australian Government announced it...

Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

Here in Australia, we aim to have a healthcare system that takes excellent care of each and every one of us. We’ve highly qualified GPs who treat common medical conditions and hospitals where Australians of all backgrounds and ages expect to receive the best possible treatment. Of course, there are always opportunities for improvement and World Patient Safety Day on 17 September is a reminder to seek them out. It’s...

Sports Venues Must Vet Their Vendors To Maintain Security

By Ashish Khanna High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ticketing, merchandising, venue access, live events...

New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk

Introduction Tenable®, the exposure management company, has released a research report titled “The Critical Few: How to Expose and Close the Threats that Matter” that identifies the key exposure points within organisations and outlines actionable steps to mitigate potential cyber threats that could endanger business operations. The History Over the past two decades, Tenable has collected and analysed approximately...

From Dollars to Digital – Your Guide to Investing Safely

Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know common misconceptions and reasons for the hesitancy include beliefs the pricing market is too volatile and that any investment in cryptocurrency is...

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

The challenges faced by IT security teams are increasing by the day. Wider attack surfaces and the emergence of more sophisticated techniques have resulted in approaches that may have worked in the past no longer being sufficient to ensure effective protection. Increasingly, organisations are recognising the need for better security strategies based on industry-leading advice. Going it alone is not an option. For...

Ransom Data Should Be Made Public

The Federal Government’s apparent appetite to compel companies to report when they pay a cybersecurity ransom for the sake of information collection could be Australia’s best chance of materially stamping out bad cyber practices. The question is when and how they do it. Recently, former Home Affairs Minister Clare O’Neal indicated that the government would seek to bring legislation to parliament in these most...

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and national security efforts from the Australian Cyber Security Centre...

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is generating significant interest among industry professionals. Contact...

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Five ways to drive high-yield results in your digital transformation efforts include: 1....

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO Report 2024 reveal ed that 91 per cent of Australian CIOs reported...

Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform security-relevant functions that ordinary users are not.(1) One common...

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

Introduction Australia is facing a significant shortfall in the number of cybersecurity professionals needed to defend people, governments and businesses. With AustCyber forecasting a shortfall of almost 17,000 cybersecurity workers by 2026, current efforts by the education system will fall well short of filling that gap. There is no single silver bullet that can solve this problem. Tackling the cybersecurity...

The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity

In today’s fast-paced digital landscape, the adage "time is money" has never been more relevant, especially when it comes to cybersecurity. If you're taking days or even weeks to report on your current cyber asset risk posture, you're leaving your organisation vulnerable in ways that cyber criminals are all too eager to exploit. The reality is stark: cyber adversaries are operating in minutes, not days. The...
Episode 130: Apurva Chiranewala

Episode 130: Apurva Chiranewala

Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Spotlight On Devices This Cyber Security Awareness Month: Organisations Need Complete Attack Surface Visibility To Protect Assets

The Australian Signals Directorate (ASD) is encouraging every individual and organisation this Cyber Security Awareness Month to take action to secure their accounts and devices from cyber threats. They have outlined four simple steps for all Australians to improve their cyber security – turn on multi-factor authentication; keep devices and software up to date; use strong and unique passwords and recognise and...

Cyber Risk Cannot Be Managed With Fragmented Security Strategies

The sheer number of cyber threats organisations face today is staggering, as demonstrated by the MediSecure hack earlier this year, which compromised the data of about 12.9 million Australians, marking it as one of the largest cyber breaches in the country's history.  In response to such threats, cybersecurity teams are constantly on high alert, deploying various threat detection and incident response solutions to...

How CISOs Are Getting Developers to Put Security First

Having to constantly measure return on investment (ROI) is the bane of many executives’ lives. For CISOs, the key challenge is proving the business value and effectiveness of cybersecurity efforts. For years, many CISOs have struggled to educate their developers about the importance of putting security first. They’ve also been working to control an increasingly complex threat landscape and spiralling attack...

Understanding Insider Threats: A Detailed Look with Insights from the Avis Cyberattack

“The Cybersecurity and Infrastructure Security Agency (CISA) defines insider threat as the threat that an insider will use their authorized access, intentionally or unintentionally, to do harm to the department’s mission, resources, personnel, facilities, information, equipment, networks, or systems. Insider threats manifest in various ways: violence, espionage, sabotage, theft, and cyber acts.”  While the...
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how ...