Security Roles

Brought to you by:

Cyber Security Engineer
VIC, Australia

Senior Security Analyst
NSW, Australia

Account Executive
Singapore, Singapore

IAM Manager
Manly, NSW, Australia

Regional Account Manager
NSW, Australia

Network Security Analyst
Boston, MA, United States

Software Engineer
NSW, Australia

SOC Lead
VIC, Australia

Security Governance Lead
NSW, Australia

Security Director
VIC, Australia

Cyber Risk Analyst
NSW, Australia

VP Cybersecurity
Singapore, Singapore

Business

DigiCert Releases Cybersecurity Predictions for 2023 and Beyond

DigiCert experts forecast future threat vectors most likely to effect organisations worldwide in the New Year

Zscaler Study Finds 90% of Global Enterprises are Adopting Zero Trust, Yet Have Not Unlocked the Full Business Potential

Zscaler, Inc. (NASDAQ:
ZS), the leader in cloud security, found that more than 90% of IT leaders who have started their migration to the cloud have implemented, are implementing, or are planning to implement a zero trust security architecture. Supporting the mass migration to zero
trust to secure users and the cloud, more than two thirds (68%) believe that secure cloud transformation is impossible with legacy network security infrastructures or that ZTNA has clear advantages over traditional firewalls and VPNs for remote access to applications.

Omdia Identifies Absolute Software as Endpoint Security ‘Vendor to Watch’

Ability to provide Endpoint Resilience, Visibility and Control differentiates Absolute Secure Endpoint product portfolio

How To Manage The Media Spotlight During A Cybersecurity Incident

The recent high profile cybersecurity attacks on Medibank and Optus, as well as several that have garnered less attention has left corporate Australia scrambling. While technical teams are focussing on risks and vulnerabilities, wise organisations are taking...
Security Navigator 2023 shows Cyber Extortion dominates landscape as 40% is malware, attackers target Europe and beyond, and SMEs, manufacturing and the public sector particularly exposed

Security Navigator 2023 shows Cyber Extortion dominates landscape as 40% is malware, attackers target Europe and beyond, and SMEs, manufacturing and the public sector particularly exposed

Orange Cyberdefense, the specialist arm of Orange Group dedicated to cybersecurity, has today launched its annual security research report, the Security Navigator 2023. Amongst other things, this year’s in-depth analysis examined 99,506 potential incidents that were investigated and triaged by our CyberSOC teams, an increase of 5% from the 2022 report. While this year’s report shows encouraging signs that the pace of incidents is slowing, several factors are still a cause for global concern. Read More

Rapid7 Assesses the ASX 200 Attack Surface

Rapid7 Assesses the ASX 200 Attack Surface

Industrial sector leads all industries in their risk exposure Read More

KBI Twitter Feed

As virtual AGMs grow in popularity in Australia and potential cyber threats surge, protecting shareholder data is more important than ever.

CTO Marc Harper shares what steps organisations must take to keep their AGMs secure. Read his piece in @KBI_Media: https://hubs.li/Q01t_Ws00

5.4 million Twitter users' stolen data leaked online — more shared privately - @LawrenceAbrams
https://www.bleepingcomputer.com/news/security/54-million-twitter-users-stolen-data-leaked-online-more-shared-privately/

#checkyoureight with our Cyber Toolbox, a new suite of tools to help protect critical networks. Our Autom8 and Valid8 tools will help tech professionals who operate critical networks enhance their cyber security posture against 5 of the Essential 8. Visit https://www.cyber.gov.au/acsc/view-all-content/news/essential-eight-assessment-guidance-package

Market Movements

Technology

Why an Effective Security Strategy Requires Three Pillars

Why an Effective Security Strategy Requires Three Pillars

The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating ... Read More

AIIA Urges Government To Reconsider Increases In Data Breach Penalties

AIIA Urges Government To Reconsider Increases In Data Breach Penalties

AIIA urges Government to reconsider increases in data breach penalties as part of wider Privacy Act review: penalties regime needs to not discourage good behaviour. Australia's peak body ... Read More

A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts. Read More

For The Sake Of Its Cybersecurity, Australia Must Come Together

For The Sake Of Its Cybersecurity, Australia Must Come Together

The pandemic has exacerbated existing security problems As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced ... Read More

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. However, industrial organisations are the last bastion of on-premises computing even though there are no technical or cyber security reasons why the cloud cannot be used to transform operations. The primary limitation is cultural, and a change is needed within industrial organisations to embrace the cloud, the benefits it provides and understand why clouds are not inherently insecure. Read More

Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data. Read More

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

Cybercrime is the biggest threat facing corporate Australia today, costing the economy more than an estimated $3trillion. Read More

Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current ... Read More

News

How To Manage The Media Spotlight During A Cybersecurity Incident

The recent high profile cybersecurity attacks on Medibank and Optus, as well as several that have garnered less attention has left corporate Australia scrambling. While technical teams are focussing on risks and vulnerabilities, wise organisations are taking...

Are ransomware attacks becoming a cost of doing business in Australia?

It’s easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly paying millions in ransoms to bad actors who have stolen or encrypted their data.

Let’s stop playing the blame game and start taking more responsibility for cybersecurity

You will know the drill if you work in cybersecurity: something goes wrong, and immediately the recriminations begin. Vendors, customers, consultants and service providers form an orderly circle, face off, and begin blaming and shaming.     We all know...

Why an Effective Security Strategy Requires Three Pillars

The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating a cohesive whole. Such an approach is concerning for a number of...

Security Roles

Brought to you by:

IAM Manager | Manly, NSW, Australia

Security Director | VIC, Australia

Cyber Risk Analyst | NSW, Australia

VP Cybersecurity | Singapore, Singapore

Cyber Security Engineer | VIC, Australia

Security Governance Lead | NSW, Australia

Senior Security Analyst | NSW, Australia

Account Executive | Singapore, Singapore

Regional Account Manager | NSW, Australia

Network Security Analyst | Boston, MA, United States

SOC Lead | VIC, Australia

Software Engineer | NSW, Australia

Technology

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. However, industrial organisations are the last bastion of on-premises computing even though there are no technical or cyber security reasons why the cloud cannot be used to transform operations. The primary limitation is cultural, and a change is needed within industrial organisations to embrace the cloud, the benefits it provides and understand why clouds are not inherently insecure. Read More

Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data. Read More

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

Cybercrime is the biggest threat facing corporate Australia today, costing the economy more than an estimated $3trillion. Read More

Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current ... Read More

Business

How To Manage The Media Spotlight During A Cybersecurity Incident

How To Manage The Media Spotlight During A Cybersecurity Incident

The recent high profile cybersecurity attacks on Medibank and Optus, as well as several that have garnered less attention has left corporate Australia scrambling. While technical teams are ... Read More

Let’s stop playing the blame game and start taking more responsibility for cybersecurity

Let’s stop playing the blame game and start taking more responsibility for cybersecurity

You will know the drill if you work in cybersecurity: something goes wrong, and immediately the recriminations begin. Vendors, customers, consultants and service providers form an orderly ... Read More

As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?

As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?

Virtual attendance at Annual General Meetings (AGM) has soared in recent years, providing unheralded levels of engagement, access and accountability. Traditionally, AGMs have been essentially a ... Read More

Personal Liability in Cyber – What Can We Expect?

Personal Liability in Cyber – What Can We Expect?

The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability. Read More

Want amazing content for your audience?