Security Roles

Brought to you by:

Cyber Security Engineer
VIC, Australia

Senior Security Analyst
NSW, Australia

Account Executive
Singapore, Singapore

IAM Manager
Manly, NSW, Australia

Regional Account Manager
NSW, Australia

Network Security Analyst
Boston, MA, United States

Software Engineer
NSW, Australia

SOC Lead
VIC, Australia

Security Governance Lead
NSW, Australia

Security Director
VIC, Australia

Cyber Risk Analyst
NSW, Australia

VP Cybersecurity
Singapore, Singapore

Business

Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief

Bitdefender have today released their Threat Debrief, examining cyber attacks detected throughout December 2022. The report explores the most prevalent ransomware families, countries experiencing the most ransomware attacks, the most popular Android trojans being used by cyber criminals, and domains being targeted with spoof attacks (where attackers impersonate a legitimate URL).

NEW FLASHPOINT REPORT SHOWS ROLE OF OPEN-SOURCE INTELLIGENCE IN RUSSIA’S FULL-SCALE INVASION OF UKRAINE

With the hybrid war approaching the one-year mark, Flashpoint’s comprehensive analysis details ten use cases on the impact of OSINT across cyber, physical, and informational battlefields

3 Data Priorities For Business Leaders This Year

As we begin 2023, economic uncertainty looms large. Many organisations continue to invest in digital transformation but with rising inflation and global conditions impacting bottom lines, leaders in APAC will have to make intelligent investments in technology that will ensure operational efficiencies, boost resilience, and fortify long-term growth.

Low confidence and lack of understanding of privacy obligations revealed in new study

ISACA’s Privacy in Practice 2023 survey report shows only 35 percent of respondents in Australia and New Zealand are confident in their organisation’s ability to ensure data privacy and achieve compliance

Nine-in-ten business leaders agree increasing diversity and inclusion in the workplace will benefit their business in areas including improving innovation and profitability

Nine-in-ten business leaders agree increasing diversity and inclusion in the workplace will benefit their business in areas including improving innovation and profitability

New research from Mastercard reveals customers in 2023 are more likely to spend with businesses that prioritise diversity, sustainability and data security Read More

Government Threat Landscape: Indian, Chinese Governments Top Targets For Threat Actors

Government Threat Landscape: Indian, Chinese Governments Top Targets For Threat Actors

Data gathered by CloudSEK’s contextual AI digital risk platform XVigil show that the number of attacks targeting the government sector has increased by 95%* in the second half of 2022, as compared to the same period in 2021. Read More

KBI Twitter Feed

Investors are demanding refunds that range from $50,000 to nearly $2 million, after company searches revealed Aurum+ has only ever issued 100 shares at $1 each. https://www.afr.com/technology/furious-investors-chase-former-young-rich-lister-over-missing-shares-20230126-p5cflg story by @jessicasier

The ransomware as a service (RaaS) ecosystem continues to evolve and expand with numerous players bringing varying techniques, goals, and skillsets. As of end of 2022, Microsoft tracks >50 unique active ransomware families and >100 threat actors using ransomware in attacks. 🧵

Market Movements

Editor’s Picks

Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief

Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief

Bitdefender have today released their Threat Debrief, examining cyber attacks detected throughout December 2022. The report explores the most prevalent ransomware families, countries experiencing the most ransomware attacks, the most popular Android trojans being used by cyber criminals, and domains being targeted with spoof attacks (where attackers impersonate a legitimate URL). Read More

Recent Podcasts

Technology

2023 Cybersecurity Predictions

2023 Cybersecurity Predictions

2022 has left its mark, particularly over the last couple of months, as cybersecurity has become a national issue. The recent high-profile breaches have cast a spotlight on the devastating effects of cyber-attacks. 2022 has propelled organisations forward in its own way. In 2023 we will see yet another chapter of cybersecurity threats and challenges, along with a shift across organisations to proactively take charge of their cyber resilience against new and evolving cyber threats. These are my top three predictions for 2023. Read More

Are ransomware attacks becoming a cost of doing business in Australia?

Are ransomware attacks becoming a cost of doing business in Australia?

It's easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly paying millions in ransoms to bad actors who have stolen or encrypted their data. Read More

Why an Effective Security Strategy Requires Three Pillars

Why an Effective Security Strategy Requires Three Pillars

The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating ... Read More

AIIA Urges Government To Reconsider Increases In Data Breach Penalties

AIIA Urges Government To Reconsider Increases In Data Breach Penalties

AIIA urges Government to reconsider increases in data breach penalties as part of wider Privacy Act review: penalties regime needs to not discourage good behaviour. Australia's peak body ... Read More

A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts. Read More

For The Sake Of Its Cybersecurity, Australia Must Come Together

For The Sake Of Its Cybersecurity, Australia Must Come Together

The pandemic has exacerbated existing security problems As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced ... Read More

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. However, industrial organisations are the last bastion of on-premises computing even though there are no technical or cyber security reasons why the cloud cannot be used to transform operations. The primary limitation is cultural, and a change is needed within industrial organisations to embrace the cloud, the benefits it provides and understand why clouds are not inherently insecure. Read More

Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data. Read More

News

3 Data Priorities For Business Leaders This Year

As we begin 2023, economic uncertainty looms large. Many organisations continue to invest in digital transformation but with rising inflation and global conditions impacting bottom lines, leaders in APAC will have to make intelligent investments in technology that will ensure operational efficiencies, boost resilience, and fortify long-term growth.

Nozomi: 2023: A Crucial Year for Cybersecurity Developments in OT and ICS Industries

As cybersecurity moves into 2023, the trends from the past few years remain firmly in place. Australian organisations are increasingly focused on optimising their use of technology, and on the convergence of operational technology (OT) and information technology (IT). There has been a rapid pace of innovation in these sectors, but with these evolutions security continues to be of utmost importance. In the coming years it will be more important than ever for companies to have a clear understanding of their operational technology assets.

Why FinTechs Must Be Wary of First Party Fraud In 2023

First party fraud is not a novel concept or challenge for financial institutions. However, due to a unique blend of market forces and downwards pressures on Australians, it is likely to undergo a significant evolution over the next 12 months. To successfully...

2023 CyberSecurity Predictions

2022 has certainly been a memorable year when it comes to cybersecurity as it has been propelled into the spotlight with the recent breaches.

In 2023, we will continue to see these types of threats arise as well as new challenges. Here are my top predictions for 2023.

KBI Twitter Feed

Investors are demanding refunds that range from $50,000 to nearly $2 million, after company searches revealed Aurum+ has only ever issued 100 shares at $1 each. https://www.afr.com/technology/furious-investors-chase-former-young-rich-lister-over-missing-shares-20230126-p5cflg story by @jessicasier

Security Roles

Brought to you by:

IAM Manager | Manly, NSW, Australia

Security Director | VIC, Australia

Cyber Risk Analyst | NSW, Australia

VP Cybersecurity | Singapore, Singapore

Cyber Security Engineer | VIC, Australia

Security Governance Lead | NSW, Australia

Senior Security Analyst | NSW, Australia

Account Executive | Singapore, Singapore

Regional Account Manager | NSW, Australia

Network Security Analyst | Boston, MA, United States

SOC Lead | VIC, Australia

Software Engineer | NSW, Australia

Technology

A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts. Read More

For The Sake Of Its Cybersecurity, Australia Must Come Together

For The Sake Of Its Cybersecurity, Australia Must Come Together

The pandemic has exacerbated existing security problems As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced ... Read More

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. However, industrial organisations are the last bastion of on-premises computing even though there are no technical or cyber security reasons why the cloud cannot be used to transform operations. The primary limitation is cultural, and a change is needed within industrial organisations to embrace the cloud, the benefits it provides and understand why clouds are not inherently insecure. Read More

Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card numbers, emails, everything! They could also send you to malicious websites, or deliver malware to your devices and steal or ransomware your data. Read More

Business

3 Data Priorities For Business Leaders This Year

3 Data Priorities For Business Leaders This Year

As we begin 2023, economic uncertainty looms large. Many organisations continue to invest in digital transformation but with rising inflation and global conditions impacting bottom lines, leaders in APAC will have to make intelligent investments in technology that will ensure operational efficiencies, boost resilience, and fortify long-term growth. Read More

Why FinTechs Must Be Wary of First Party Fraud In 2023

Why FinTechs Must Be Wary of First Party Fraud In 2023

First party fraud is not a novel concept or challenge for financial institutions. However, due to a unique blend of market forces and downwards pressures on Australians, it is likely to undergo ... Read More

2023 CyberSecurity Predictions

2023 CyberSecurity Predictions

2022 has certainly been a memorable year when it comes to cybersecurity as it has been propelled into the spotlight with the recent breaches. In 2023, we will continue to see these types of threats arise as well as new challenges. Here are my top predictions for 2023. Read More

How To Manage The Media Spotlight During A Cybersecurity Incident

How To Manage The Media Spotlight During A Cybersecurity Incident

The recent high profile cybersecurity attacks on Medibank and Optus, as well as several that have garnered less attention has left corporate Australia scrambling. While technical teams are ... Read More

Want amazing content for your audience?