Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it also opens the door for innovative cyber threats. Indeed, this “transformative and dualistic shift” presents unprecedented challenges and opportunities and is sparking calls for regulatory measures to ...

Podcasts

Business News ↓

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...

The Glimpse at the Future of Software Academia

Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has its’ origins in simplistic terms - via code written on manual punch cards and then fed into...

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the vast majority of Australian cybersecurity and IT leaders (68%) view cloud infrastructure as the greatest source of cyber risk in their organisation....

The Real “People Problem” In Cybersecurity Is Not What You Think It Is

The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people are the problem?’ Bosses, cybersecurity teams, users, employees, hackers: if a party exists to whom blame could be apportioned, it’s been done. But the...

CISOs in 2024: Embracing a Strategic Security Vision

In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their entire organisation. This evolution reflects the ever-increasing complexity of the cyberthreat landscape, where sophisticated attacks target not just...

Five Steps For New Zealand Businesses To Effectively Manage Incident Response

With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will respond to a cybersecurity incident. In the last year, data breaches and other attacks have cost New Zealand around $20 million. The degree of incident...

Growing Sustainability Through Colocation Services

The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while many decisions are increasingly being made with enhancing sustainability as an important driver. One key trend is for businesses is moving to hybrid...

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there's also an increase in the number of available open-source software. However not all open-source components are created equally or maintained properly. As a result, we are seeing an increase in software supply chain...

Fish In a Barrel – Australia’s At-risk Cleared Personnel

Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified  resources must hold a security clearance. This includes classified information, systems that hold classified information, and classified assets. An individual may also be required to hold a security clearance if they occupy...

AI Skills Could Boost Australia Workers’ Salaries By More Than 29% And Accelerate Career Growth As AI Adoption Ramps Up, Finds New Research

Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business operations (35%) enjoying the highest pay bumps. To better understand emerging AI usage trends and skilling needs in Australian workplaces, AWS...

Protecting The Digital Realm Knows No Gender

Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more appealing to women, many of whom are making significant contributions to development. It’s more than conquering challenges; it’s about showcasing the...

Reputational Risk, Ransomware and the ‘Operational Resilience’ Imperative

An Overview Whether it’s on international headlines or in local Australian news, headlines of data related business outages, and associated credibility damage are on the rise. From the DP World hack that stranded tens of thousands of shipping containers, to increasingly audacious ransomware attacks on all levels of public and private organisations – data management has become a mainstream topic and highly...

AI-generated Code: The Fourth Component of Software

There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In parallel, software security professionals are closely watching the practical impact of GenAI and how application security testing (AST) must adapt as...

Using Annual Loss Expectancy (ALE) for Cybersecurity Tech Investment Planning and Building a Business Case

Ensuring and maintaining a robust defense-in-depth strategy requires new technology investments, especially as many standard detection and response technologies can’t stop ransomware and the evasive and sophisticated techniques attackers are commonly using.   As a cybersecurity leader, you operate in a reality where resources and budgets are always constrained. You may find that now, you’re not only having to...

Transforming Tomorrow: How Women in Science, Technology, Engineering, and Mathematics (STEM) are Shaping a Better Future

According to the 2023 Australian Government report ‘State of STEM Gender Equity 2023’, only 15% of STEM jobs are held by women – an under representation that presents a significant opportunity for organisations to advance female participation in this rapidly emerging field. As we stride into the future there is no doubt women will play a far more significant role in STEM, driving innovation, competitiveness, and...

Why Agile Learning is Vital for Secure Software Development

With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either they themselves are responsible for their code’s security or that every member of their team should be held accountable. The research also found 75%...
Episode 130: Apurva Chiranewala

Episode 130: Apurva Chiranewala

Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...

‘Captivity Clouds’ – A Trap For Modern Day Security Leaders

Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily restricted ecosystems. Many are finding their tool sets severely...

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the vast majority of Australian cybersecurity and IT leaders (68%) view cloud infrastructure as the greatest source of cyber risk in their organisation....

How Data Quality Is Limiting Your Organisation’s AI Success

Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more than that. We’re now living in a world where holding onto too much data could get you into hot water in the event of a breach, at the same time, not...
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...