Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the United Kingdom, and Australia - as well as other close allies around the world. At BOKA, the goal reaches beyond just providing essential funding to foster growth of the companies they invest in. The group also brings extensive knowledge, expertise, and experience to supercharge that ...

Podcasts

Episode 293 Deep Dive: David Trossell | How To Move Data Faster Over WANs
byKBI.Media

In this episode, we sit down with David Trossell, CEO and CTO of Bridgeworks, as he discusses the advancement of WAN acceleration technology and its impact on data transfer speeds. David explores the historical evolution from broadband connectivity to modern-day WAN acceleration, highlighting the limitations of traditional WAN optimization methods. He explains how AI-driven parallelization can address latency issues and significantly enhance data throughput across networks.

Additionally, David provides insights into misconceptions about WAN acceleration and optimization, emphasizing the importance of secure backups, air-gapped systems, and the resurgence of tape technology for robust data protection against cyber threats.

David Trossell is a recognised leader in the storage technology industry. He is CEO and CTO of award-winning WAN Acceleration company Bridgeworks, where he holds 18 technology patents. David is also committed to supporting British STEM initiatives and developing technology leaders through UK university and college apprenticeship programmes.

Business News ↓

2024 Lessons Shaping 2025 Cybersecurity Trends

Introduction Ransomware attacks have continued to progress throughout this year. Groups such as AlphV, LockBit, Hive, and BlackCat are employing advanced tactics to infiltrate systems and conduct lateral movements within networks. The RansomHub attack on Halliburton, in which the company likely incurred losses of approximately $35 million against its billions in earnings, underscores the notion that employee...

Navigating And Combatting Scams In Banking

Australia’s banking sector is dedicated to protecting its customers from sophisticated criminal networks through the Scam-Safe Accord—a globally leading initiative designed to disrupt, detect, and respond to scam activity. This industry-wide commitment unites community-owned banks, building societies, credit unions, and commercial banks under a comprehensive framework of anti-scam measures to strengthen financial...

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing is becoming particularly prominent as generative artificial...

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

In today’s digital age, CISOs face increasing pressure to protect their organisations from a barrage of cyber threats. In fact, the latest statistics from the Office of the Australian Information Commissioner (OAIC) show the number of data breaches notified to the regulator in the first half of 2024 was at its highest in three and a half years.   Yet, despite these mounting challenges, many CISOs remain fixated on...

Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly complex and sophisticated. The developers behind these phishing kits invest considerable resources in their creation and continuous enhancement....

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors.  Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand threats. Minimizing external dependencies for cybersecurity...

Protecting Data from Ransomware: The Power of Advanced Encryption

Introduction Ransomware has evolved from a disruptive nuisance to a sophisticated cyber threat capable of crippling businesses. What was once a single extortion tactic—locking a company’s files and demanding payment for their release—has now become a dual threat. Attackers not only lock access to critical systems but also steal sensitive data, threatening to expose it unless a ransom is paid. This double extortion...

Tackling Takedowns – How To Mitigate Risks of Fake Domains

Introduction Every year, more and more Australian companies are confronted with website and email spoofing worldwide. The recent Annual Cyber Threat Report 2023-2024 revealed that the Australian Signals Directorate’s Domain Takedown Service made more than 189,000 requests for removals, up 49% from the previous year. Cyber criminals use fake websites and fake email accounts for phishing, spear phishing and social...

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

At the Art of Play with my youngest some time back, I was reminded how covering things up only masks the problem. It got me thinking about the art of mastering cyber risk. Disconnected governance, incomplete controls or sheer technology complexity can mask the risk lurking beneath the surface—untreated and potentially catastrophic. Critical Infrastructure organisations are under increasing pressure to manage...

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

In the ever-changing landscape of cybersecurity, experts are increasingly advocating for Secure-by-Design principles to address the accelerating challenges of today’s digital world. The concept emphasises embedding security into software from the beginning of the development process in a shift that reflects a significant maturation of the cybersecurity industry. Cybersecurity’s early days were dominated by the...

Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

By Ashwin Ram, Evangelist, Office of the CTO, Check Point Software Technologies Australia & New Zealand The latest report from the Office of the Australian Information Commissioner (OAIC) reveals a troubling trend that boards can no longer afford to ignore: 527 data breaches in just six months - an alarming nine per cent increase for the period of January to June 2024. With high-profile brands such as Medibank,...

2025 Cybersecurity Predictions By Qualys

1. Prediction: The increasing use of AI will not alter the basics of cybersecurity strategies   “While several enterprises are looking for the next best AI solution in an effort to fight fire with fire, I am reminded of the famous Alphonse Karr quote, “The more things change, the more they stay the same.” As such, a better question is, “What do businesses stand to lose (i.e. what is the value at risk) from AI abuse...

How Breach Readiness Will Shape Cyber Defense In 2025

Let me start by wishing everyone Happy Holidays and a great new 2025 ahead. As we exit 2024, I am equally hopeful and worried about the year ahead. While I am concerned that even increased spending on cybersecurity has not slowed down cyberattacks, with increased interest in breach readiness and cyber defense, I am hopeful that the industry will focus on reducing opportunities to a large extent. In 2024, as I...

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to emulate voices on the telephone. They might impersonate a family...

When Post-Quantum Cryptography Is No Longer Post-Quantum

In an era where quantum computing edges closer to practicality, the cryptographic protocols we rely on must evolve to meet emerging challenges. Post-Quantum Cryptography (PQC) represents a proactive step towards safeguarding sensitive information against quantum-powered threats. However, as with any technology at the frontier of innovation, PQC standards are not set in stone. The Changing Face of PQC Standards The...

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company data.(2) This rise in cyber incidents translates into significant...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

2024 Lessons Shaping 2025 Cybersecurity Trends

Introduction Ransomware attacks have continued to progress throughout this year. Groups such as AlphV, LockBit, Hive, and BlackCat are employing advanced tactics to infiltrate systems and conduct lateral movements within networks. The RansomHub attack on Halliburton, in which the company likely incurred losses of approximately $35 million against its billions in earnings, underscores the notion that employee...

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing is becoming particularly prominent as generative artificial...

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

Since the release of ChatGPT in late 2022, artificial intelligence (AI) tools have become widely used by software developers. According to research by the Australian Government’s Department of Industry, Science and Resources[1], 35% of small and mid-sized businesses are already using AI tools and usage is expected to continue to increase. Applications include everything from marketing automation and fraud detection...

Six Trends Shaping The Future Of The Security Industry In 2025

As the security sector evolves, the trends and technologies shaping our industry also advance at an unprecedented pace. From hybrid solutions to artificial intelligence (AI) and new ways to use your security hardware, the emerging trends are not just reshaping the capabilities of security systems but also the way organisations approach resilience, efficiency, and innovation. This promises to be a transformative...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and ...