The Future of VPNs? No Where.

The Future of VPNs? No Where.

Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to ...
A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For the legal community, there is something for everyone: migration law, procurement, consumer, corporate and commercial, in-house, and of course government. For those hoping the Strategy would provide ...

Podcasts

Episode 268 Deep Dive: Matt Preswick | Democratising Cloud Security – Will Security Become the Enabler to AI Usage?
byKBI.Media

Matt Preswick is the Enterprise Solutions Engineer for Wiz in APJ, with experience in network, email and cloud security at leading security vendors in EMEA and APAC. Before joining Wiz, he lead operations at a Sydney based network analytics startup before returning to Cloud security with Wiz.

Matt is passionate about developing scalable and actionable security practices within APJs largest organisations.

Business News ↓

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

In a time of digital transformation and big data, privacy has never been a bigger concern. An Introduction There seems to be no limit to the number of devices connected to our networks. As internet connectivity becomes more widespread and affordable, more of us can connect everyday items, including phones, alarm systems, and lighting equipment, to our networks. But while this improves accessibility and usability,...

Why CISOs Need a Voice In the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. The CISO must be supported within the right culture, feel...

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen on the customer. In the past, default solutions to the challenge of reducing third-party cyber risk have focused on SRS, providing cyber risk...

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams

With AustCyber touting a shortfall of 16,000 cybersecurity professionals by 2026, the race to build the nation’s cybersecurity talent and capacity is on. Organisations of all sizes and across every industry vertical are trying to find skilled people to help protect their vital digital assets. But with entry level positions now being paid in excess of $100,000, Australian companies are looking to maximise the return...

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory requirements, the pressures become even more intense. It’s also forcing many organisations to rethink their internal security programs and align them with...
Kavitha Mariappan, ZScaler

Predicting The Future – With Kavitha Mariappan

What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against critical infrastructure targets, especially water and wastewater...

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach. These trends involve changing regulations, confusion about security products, and the drive to save costs through consolidation. Let's explore some...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Ransomware, phishing, hackers, data loss - the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches across the Asia Pacific, according to Verizon’s 2023 Data Breach Investigations Report (DBIR). As Australian national leaders continue to look for ways to...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson cover

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive measures, and the imperative for industry-wide collaboration and...

How the Security of Critical Infrastructure (SOCI) Act is strengthening Australia’s critical infrastructure cybersecurity posture

Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity. Unsurprisingly, they have become attractive targets for cyber criminals seeking financial gain intent on hampering essential services by stealing sensitive data or impeding operational...

The Importance of Undertaking Cyber Risk Quantification

According to Check Point Software’s Threat Intelligence Report on Australia & New Zealand, an organisation in the region has been attacked on average 879 times per week in the last six months. Adding to the complexity for cybersecurity practitioners is the ever-evolving threat landscape that includes a surge in ransomware attacks with over 5,000 victims reported in 2023, marking a 90 per cent increase from the...

Cyber Insurance Isn’t a Free Pass for Australian Businesses

After years of warnings and breaches, the business world has accepted that when it comes to cyber-attacks, it’s a matter of ‘when’, not ‘if’. Not a single organisation is immune to a breach – not even the most secretive and cautious. Down under, a KPMG report in 2023 found a third of Australian businesses – that’s 693,053 organisations – have experienced cybercrime, costing the economy AU$29 billion per year....
Cybersecurity Startup Space: Investing in Early-Stage Companies cover

Cybersecurity Startup Space: Investing in Early-Stage Companies

In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a successful start-up. The Competitive Advantage and Sustainability of Products With numerous companies addressing similar attack vectors, distinguishing...
Navigating the Australian Cybersecurity Market cover

Navigating the Australian Cybersecurity Market

In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the cybersecurity landscape.Collaborative Nature of the Australian...

Where Australian Organisations Go Wrong With Cyber Risk Quantification

In an age where boards and directors are more interested in cybersecurity than ever before - rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ - the best way for CISOs and cybersecurity teams to communicate risk is in terms that the executive committee and directors will understand. As a security leader, that means understanding your audience and the way they prefer to take in...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...
Episode 130: Apurva Chiranewala

Episode 130: Apurva Chiranewala

Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

In a time of digital transformation and big data, privacy has never been a bigger concern. An Introduction There seems to be no limit to the number of devices connected to our networks. As internet connectivity becomes more widespread and affordable, more of us can connect everyday items, including phones, alarm systems, and lighting equipment, to our networks. But while this improves accessibility and usability,...

Why Robust Disaster Recovery Is a USP for MSPs

The strategic use of cloud technology has become a cornerstone for businesses who wish to stay competitive and adaptable in today’s evolving landscape. However, amidst the rapid enthusiasm to adopt and optimise cloud resources, crucial considerations such as security and disaster recovery are often overlooked in spite that spending on security, risk, and compliance remains high regardless of the economic...

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen on the customer. In the past, default solutions to the challenge of reducing third-party cyber risk have focused on SRS, providing cyber risk...

Three Force Multipliers To Boost Cybersecurity Protections For Governments

Cyber threats are a serious challenge that governments worldwide are dealing with every day. A cyberattack can cause breach of data or information, cost time and money to resolve or cause downtime impacting operations. For the past 10 years, an annual CIO survey in the US has found cybersecurity to be the number one concern for state and local governments. In response, more and more IT teams are implementing more...
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...