Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it also opens the door for innovative cyber threats. Indeed, this “transformative and dualistic shift” presents unprecedented challenges and opportunities and is sparking calls for regulatory measures to ...

Podcasts

Episode 246 Deep Dive: David Batch | Demystifying Privacy by Design, Understanding Its Challenges, and Identifying Solutions
byKBI.Media

In this episode, we are joined by David Batch (Executive Director, Privacy Advisory – CyberCX) as we delve into the principles of Privacy by Design and the need for organizations to prioritise privacy as a pillar of trust. From data retention challenges to the impact of data erasure on regulated industries, we navigate through the complexities of privacy management. Join us as we explore the potential catalysts for change, the role of regulatory frameworks, and the innovative solutions for empowering individuals to take control of their privacy.

Business News ↓

Why Agile Learning is Vital for Secure Software Development

With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either they themselves are responsible for their code’s security or that every member of their team should be held accountable. The research also found 75%...

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. According to the ASD, the top three causes of cyber incidents in Australia in 2023 were email compromise, business email compromise fraud, and online banking fraud. From Verizon’s DBIR report, we can see that APAC’s top patterns...

Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

With growing concern and scepticism around the misuse of technology, it’s vital for organisations to have the right safeguards in place to protect their people and the business overall. It starts with the belief that the technology we use must earn our trust if it is to transform lives for the better. So how might organisations go about achieving this? At BT, we’ve identified three challenges concerning people...

Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

New research released today by Veritas Technologies shows that confusion over generative AI in the workplace is simultaneously creating a divide between employees while also increasing the risk of exposing sensitive information. More than two-thirds (68%) of Australian office workers acknowledged using generative AI tools such as ChatGPT at work—including risky behaviour like inputting customer details, employee...

Dragos OT Cybersecurity “Year in Review” Reports Rise in Geopolitically Driven Attacks, Ransomware, and Threat Groups

Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today released its sixth annual Dragos OT Cybersecurity Year in Review report, the most comprehensive report on cyber threats facing industrial organisations. The report named the emergence of three new threat groups, including VOLTZITE linked to Volt Typhoon, and found that ransomware continued to be the most reported...

Australian Security Teams Start To Address Functional Overlap In Their Tooling Stacks

The seemingly unending list of threat actors successfully targeting Australian organisations, and a corresponding rise in financial losses and regulatory scrutiny, has firms, leaders and cybersecurity teams on edge. Australian and New Zealand businesses lost almost 10% of their revenue to cyber attacks in the last year, recent research by Fastly shows. That is leading many to contemplate the extent to which their...

Weaving Sustainability into the DNA of How Companies Operate

Once a marginal topic, sustainability is now critical focus area with commitment required at all levels of the company starting with the Board. It goes well beyond ticking off ESG goals to embedding a culture of change across the organisation - from the set of company mandates, trickling down simply to ‘how we do things around here.’ When companies focus on three core areas for change: utilising greener technology;...

How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency, and success, it simultaneously empowers malicious threat actors to evolve and make more sophisticated attacks on successful businesses. Modern business...

The Future of CISOs: Navigating Trends and Evolving Roles

Introduction In September 2023, the Australian federal government introduced new rules making the appointment of Chief Information Security Officers (CISOs) at its largest agencies mandatory. This marks an inflection point and recognition of the importance of cyber security leadership, in the current climate of escalating risk. According to the Australian Bureau of Statistics, more than two in 10 Australian...

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies. Real World Telemetry...

Boosting Confidence In Ransomware Recovery

Introduction The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of cyberthreats. The Australian Signals Directorate (ASD)...

Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and fatigue. The study revealed that burnout is felt across almost all...

Compliance and Security: The AI-Powered Identity Revolution

The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities. The challenge is most organisations haven’t yet implemented a comprehensive identity security strategy to help manage the access for hundreds to thousands of identities, with nearly half of global companies still at the beginning of their...

A New Cyber Battleground, Australian Resilience And Adaptation Will Shine Through

2024 is upon us and Australia and New Zealand stand as vibrant hubs of innovation and technological evolution. The Antipodes are set to witness transformative trends in both technology and cybersecurity that promise to shape the digital frontier. In Australia, the tech and cybersecurity industry are booming with key trends such as AI – and the infrastructure needed to support it – ramping up, while companies shore...

Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the United Kingdom, and Australia - as well as other close allies around the world. At BOKA, the goal reaches beyond just providing essential funding to...

The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data

Introduction Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control. On December 13, 2023, Tenable Research publicly disclosed security flaws uncovered in Edulog’s Parent Portal suite of products. These flaws allowed...
Episode 130: Apurva Chiranewala

Episode 130: Apurva Chiranewala

Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

If you immediately think of email when you think of phishing, you’re not alone. However, a new form of a text-based scam is making waves – highlighted by a seemingly legitimate text from the USPS which lets receivers know that their “package” arrived at the warehouse. To receive the package, it instructs users to click on a link to enter their information for delivery. This is just one of many examples of an...

How Generative AI Can Lend A Helping Hand To IT Security Teams

The State Of Play As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools. Capable of creating everything from text and images to computer code and analytics, the tools are rapidly improving. Significant investments by companies such as Microsoft and Google will ensure the pace of this...

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean that governments and regulatory bodies worldwide are implementing...

Why Agile Learning is Vital for Secure Software Development

With recent increases in cyberattacks showing no sign of abating, the role software developers need to play to improve levels of protection is becoming more widely understood. Encouragingly, industry research[1] shows nearly four in five developers believe that either they themselves are responsible for their code’s security or that every member of their team should be held accountable. The research also found 75%...
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...