Romantic Chatbots – To Be, or Not To Be
Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon ...
In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion ...
Australia is poised to enact a new law that imposes stringent regulations on sharing defence technology with foreign ...
Automated security reconnaissance and penetration testing solution will be incorporated into F5 Distributed Cloud ...
VAST Data today announced it has signed a deal with ASI Solutions to provide VAST’s data platform to customers directly ...
CrowdStrike redefines modern data security with the unified platform that protects data at rest and in motion as it flows ...
Podcasts
Business News ↓
Companies join forces to bring LLM-powered applications to the enterprise, unleashing the power of the CrowdStrike Falcon® ...
It’s A New Day For Your Data. Cisco, Supercharged By Splunk, Will Revolutionize The Way Companies Harness Data To Connect ...
Wavelink, a leader in providing enterprise solutions to the channel, has announced a new distribution agreement with ...
The growing scope and severity of cyber threats targeting Australian businesses this past year has put a spotlight on the ...
A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after ...
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to ...
First party fraud is not a novel concept or challenge for financial institutions. However, due to a unique blend of market ...
Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most ...
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons ...
A class action lawsuit has been filed against the telecommunications company Optus by former and current customers whose ...
Introduction
Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity ...
Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...
The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The ...
Markets & Trading
YOUR SECURITY NEWSFEED
The KBI Dossier
The Cybersecurity news feed delivered straight to your Inbox.
Technology News ↓
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 ...
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of ...
Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other ...
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full ...
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 ...
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of ...
In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, ...
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons ...
The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially ...
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 ...
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of ...
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially ...
With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never ...
Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data ...
Introduction
Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers ...
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to ...
APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have ...
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to ...
The 2023 Dragos OT Cybersecurity Year in Review is an annual overview and analysis of OT-focused global threat activities, ...
82% of executives want to see an improvement in the sustainability of their workplaces, but the big question is how do ...
The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber ...
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full ...
This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how ...
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been ...
Australian organisations should pay attention to 15 high risk vulnerabilities across Microsoft, Apple and Google. Some of ...
Five high risk vulnerabilities from March to watch out for in Microsoft, Adobe, Fortinet, and Samsung