Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and ...
Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the United Kingdom, and Australia - as well as other close allies around the world. At BOKA, the goal reaches beyond just providing essential funding to foster growth of the companies they invest in. The group also brings extensive knowledge, expertise, and experience to supercharge that ...

Podcasts

Episode 289 Deep Dive: Jarrod Lucia | Securing AI-centric Infrastructures
byKBI.Media

In this episode, we sit down with Jarrod Lucia, Evangelist Architect, AI and SP Infrastructure, APJC from F5, as he discusses securing AI-centric infrastructures, specifically the emerging AI factories powering today’s workload. Jarrod delves into the rise of AI factories, large data centers purpose-built for AI workloads, and the advanced sustainability measures being considered in their design, such as green energy mandates and innovative water recirculation systems.

We also explore the unique security demands of AI factories, explaining the need for both traditional data center precautions and modern zero-trust models. Jarrod shares insights on the various stages of AI factory development and integration, emphasizing the importance of securing data throughout its lifecycle within these specialized environments.

As a seasoned industry professional with over 25 years of experience in Service Provider and Cloud Engineering, Jarrod has developed a unique blend of technical expertise and leadership skills. His background in Mobile and Satellite technologies has equipped him with a deep understanding of network design, implementation, and troubleshooting.

He’s passionate about staying at the forefront of emerging technologies, particularly Artificial Intelligence (AI) and its applications in Cloud, Service Providers, and IoT at scale. The convergence of Edge Networks, Cloud capabilities, and AI Factories will revolutionise industry and how applications are delivered and he’s excited to explore the potential of AI infrastructure and its impact on the future of technology and business.

Business News ↓

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors.  Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand threats. Minimizing external dependencies for cybersecurity...

Protecting Data from Ransomware: The Power of Advanced Encryption

Introduction Ransomware has evolved from a disruptive nuisance to a sophisticated cyber threat capable of crippling businesses. What was once a single extortion tactic—locking a company’s files and demanding payment for their release—has now become a dual threat. Attackers not only lock access to critical systems but also steal sensitive data, threatening to expose it unless a ransom is paid. This double extortion...

Tackling Takedowns – How To Mitigate Risks of Fake Domains

Introduction Every year, more and more Australian companies are confronted with website and email spoofing worldwide. The recent Annual Cyber Threat Report 2023-2024 revealed that the Australian Signals Directorate’s Domain Takedown Service made more than 189,000 requests for removals, up 49% from the previous year. Cyber criminals use fake websites and fake email accounts for phishing, spear phishing and social...

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

At the Art of Play with my youngest some time back, I was reminded how covering things up only masks the problem. It got me thinking about the art of mastering cyber risk. Disconnected governance, incomplete controls or sheer technology complexity can mask the risk lurking beneath the surface—untreated and potentially catastrophic. Critical Infrastructure organisations are under increasing pressure to manage...

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

In the ever-changing landscape of cybersecurity, experts are increasingly advocating for Secure-by-Design principles to address the accelerating challenges of today’s digital world. The concept emphasises embedding security into software from the beginning of the development process in a shift that reflects a significant maturation of the cybersecurity industry. Cybersecurity’s early days were dominated by the...

Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

By Ashwin Ram, Evangelist, Office of the CTO, Check Point Software Technologies Australia & New Zealand The latest report from the Office of the Australian Information Commissioner (OAIC) reveals a troubling trend that boards can no longer afford to ignore: 527 data breaches in just six months - an alarming nine per cent increase for the period of January to June 2024. With high-profile brands such as Medibank,...

2025 Cybersecurity Predictions By Qualys

1. Prediction: The increasing use of AI will not alter the basics of cybersecurity strategies   “While several enterprises are looking for the next best AI solution in an effort to fight fire with fire, I am reminded of the famous Alphonse Karr quote, “The more things change, the more they stay the same.” As such, a better question is, “What do businesses stand to lose (i.e. what is the value at risk) from AI abuse...

How Breach Readiness Will Shape Cyber Defense In 2025

Let me start by wishing everyone Happy Holidays and a great new 2025 ahead. As we exit 2024, I am equally hopeful and worried about the year ahead. While I am concerned that even increased spending on cybersecurity has not slowed down cyberattacks, with increased interest in breach readiness and cyber defense, I am hopeful that the industry will focus on reducing opportunities to a large extent. In 2024, as I...

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to emulate voices on the telephone. They might impersonate a family...

When Post-Quantum Cryptography Is No Longer Post-Quantum

In an era where quantum computing edges closer to practicality, the cryptographic protocols we rely on must evolve to meet emerging challenges. Post-Quantum Cryptography (PQC) represents a proactive step towards safeguarding sensitive information against quantum-powered threats. However, as with any technology at the frontier of innovation, PQC standards are not set in stone. The Changing Face of PQC Standards The...

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company data.(2) This rise in cyber incidents translates into significant...

Antifragility – The Essential Strategy for Modern Cyber Defense

This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which addresses fundamental issues of randomness, probability, complexity, and uncertainty, is not only critical for risks in financial planning and life in general but is also very relevant to the context...

The Five Step Journey To Securing Australia’s Most Important Data Assets

Financial institutions are leading the way in their pursuit of adaptive protections against evolving information-stealing threats. Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and...

AI’s Transformative Role In Corporate Governance

Introduction Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, managing risks, and ensuring compliance. The opportunity...

Secure-By-Design Is A Significant Exercise, But The Rewards Are Significant, Too

Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation. The idea of baking security into software right from the start of the development lifecycle is going from strength to strength, having gained important buy-in from cybersecurity agencies and vendors in the past year. Over 250 vendors supplying the US government have now signed a...

Cloud-Based Post-Quantum Cryptography (PQC) vs Local PQC: Not as Straightforward as You’d Think

Introduction As the quantum computing era approaches, organisations must adopt Post-Quantum Cryptography (PQC) to safeguard their data against future quantum threats. A critical decision in this transition is whether to implement PQC through cloud-based services or rely on local deployment. Each approach offers distinct advantages and challenges, and the right choice depends on the organisation’s specific needs,...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown

We live in uncertain times. When we consider the “known unknowns” – like war, financial crises, and of course, cyber disruptions – as events that we can conceive, the likelihood and severity of them remain shrouded in uncertainty. The realm of cybersecurity, like many aspects of our interconnected world, is characterised by a constant dance with that unknown. Take the CrowdStrike incident that happened in July, for...
Qualys Names New Managing Director for Australia And New Zealand cover

Data Privacy Day – Qualys Shares Insights For Effective Data Security

On Data Privacy Day, we are reminded of the critical importance of safeguarding personal information and empowering organisations to protect their digital assets. In an era where data is a key currency, it’s vital to prioritise transparency, trust, and the responsible use of information to foster a secure digital environment for all Australians.  As technology adoption accelerates, organisations face growing...

Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

As Data Privacy Day approaches, discussions often lean toward pessimism, with increased cyber threats and exposed data dominating the narrative. However, it’s important to recognise the positive strides made in Australia throughout 2024, building the right foundations to protect data privacy with key privacy reforms passing through Parliament and a reduction in the number of cyber crimes reported by the ACSC. We...

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Introduction Cloud environments, while offering unparalleled agility and scalability, are also a major source of risk exposure for organisations worldwide, with breaches ranging from misconfigurations to advanced cyberattacks. According to Tenable’s 2024 Cloud Security Outlook, 95% of organisations had experienced cloud-related breaches in the previous 18 months. New cloud-based attack vectors have combined with...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and ...