![Deepfakes and the US Election | A Slippery Slope](https://kbi.media/wp-content/uploads/2024/07/ai-image_dbb9fa35dd1722752131ec08fdbb7e66_2000-300x300.png)
The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the ...
![Technology Company Names Have More Meaning than We Expected…](https://kbi.media/wp-content/uploads/2024/07/than-we-expected_566f9a2059376994680a866f9a22cd85_2000-300x300.jpg)
Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity ...
![Exploring Opportunities, Fears, and the Future with AI](https://kbi.media/wp-content/uploads/2024/07/fears-and-the-future-with-ai_6785bec3fb550303028a6281d55a1212_2000-300x300.jpg)
Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted ...
Aon utilises SentinelOne Singularity™ platform to help profile risk for underwriting and provide more visibility into ...
Ahold Delhaize, Hitachi Construction Machinery, Lemtrans, and Mazda Motors Logistics Europe N.V. move their ...
BRISBANE, AUSTRALIA. (July 10, 2024) – Pax8, the leading cloud commerce marketplace, today announced that ElectroNeek, a ...
Business News ↓
Unified approach to predictive cyber-defense with simple pricing, increases visibility and boosts security posture, ...
The combined organisation will empower customers with a best-of-breed, AI-driven security operations platform fortified ...
F5 today announced expanded technology partnerships and customer win milestones that reinforce its position as a leader in ...
![Why CISOs Need a Voice In the Boardroom](https://kbi.media/wp-content/uploads/2024/07/Stuart-Mort-KPMG-150x150.jpg)
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a ...
![The Conversations Boards Should Have About Cybersecurity](https://kbi.media/wp-content/uploads/2024/02/Jason-Whyte-Trustwave-150x150.jpg)
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one ...
![Communication Is Key to IT Security](https://kbi.media/wp-content/uploads/2024/01/Jesse-Booth-GoTo-150x150.jpg)
The growing scope and severity of cyber threats targeting Australian businesses this past year has put a spotlight on the ...
![Is Australia set to follow the UK, for banking liabilities?](https://kbi.media/wp-content/uploads/2023/06/GUESTS-DO-NOT-TOUCH-18-150x150.png)
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to ...
![Why FinTechs Must Be Wary of First Party Fraud In 2023](https://kbi.media/wp-content/uploads/2022/12/Carol-Chris-150x150.png)
First party fraud is not a novel concept or challenge for financial institutions. However, due to a unique blend of market ...
![Episode 130: Apurva Chiranewala](https://kbi.media/wp-content/uploads/2022/07/Featured-image-2-150x150.png)
Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
![How Privacy-By-Design Is Influencing Australia’s Physical Security Environments](https://kbi.media/wp-content/uploads/2024/07/William-Glasson-Genetec-150x150.jpg)
When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current ...
![The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity](https://kbi.media/wp-content/uploads/2024/01/Brenton-Steenkamp-Clayton-Utz-150x150.jpg)
Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most ...
![A Legal Take On The Cybersecurity Strategy 2023-2030](https://kbi.media/wp-content/uploads/2023/12/Looking-Into-The-Legal-Future-150x150.jpg)
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons ...
![Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success](https://kbi.media/wp-content/uploads/2024/01/Mergers-Acquisitions-150x150.jpg)
Introduction
Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity ...
![Episode 149: Matt Johnston](https://kbi.media/wp-content/uploads/2022/08/Matt-Johnston-150x150.png)
Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...
![4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)](https://kbi.media/wp-content/uploads/2022/09/Synopsys-Logo-150x150.jpg)
The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The ...
Markets & Trading
YOUR SECURITY NEWSFEED
The KBI Dossier
The Cybersecurity news feed delivered straight to your Inbox.
Technology News ↓
![How Privacy-By-Design Is Influencing Australia’s Physical Security Environments](https://kbi.media/wp-content/uploads/2024/07/William-Glasson-Genetec-150x150.jpg)
When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current ...
![Exploring Opportunities, Fears, and the Future with AI](https://kbi.media/wp-content/uploads/2024/07/fears-and-the-future-with-ai_6785bec3fb550303028a6281d55a1212_2000-150x150.jpg)
Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted ...
![Why Robust Disaster Recovery Is a USP for MSPs](https://kbi.media/wp-content/uploads/2024/07/Jeff-Lee-150x150.jpg)
As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance ...
![Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity](https://kbi.media/wp-content/uploads/2024/06/Pieter-Danhieux-150x150.jpg)
Raising the standard of code quality will take a significant change in how developers view and learn security best ...
![Australia’s FSIs Can Lead The Way In Secure AI-augmented Software Development](https://kbi.media/wp-content/uploads/2024/05/ff-c534cc698763712b252e42827415f8d7-ff-Matias-Madou-150x150.jpeg)
The early successes seen with pair programming will amount to nothing if the code output is of poor quality or is insecure.
![Business Risk Observability Is Vital For IT Teams To Come Together And Mitigate Security Risks Within Modern Applications](https://kbi.media/wp-content/uploads/2024/04/James-Harvey-Cisco-150x150.jpg)
For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many ...
![Improving Cybersecurity Within Australia’s Water Utilities](https://kbi.media/wp-content/uploads/2024/01/Leonardo-Hutabarat-LogRhythm-150x150.jpg)
In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, ...
![A Legal Take On The Cybersecurity Strategy 2023-2030](https://kbi.media/wp-content/uploads/2023/12/Looking-Into-The-Legal-Future-150x150.jpg)
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons ...
![Critical Infrastructure and IoT](https://kbi.media/wp-content/uploads/2023/10/CyAmast-Critical-Infrastructure-IoT-IIoT-150x150.jpg)
The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...
![Why Robust Disaster Recovery Is a USP for MSPs](https://kbi.media/wp-content/uploads/2024/07/Jeff-Lee-150x150.jpg)
As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance ...
![Small Businesses Can Pull Their SOCs Up](https://kbi.media/wp-content/uploads/2024/05/Shane-Maher-Intelliworx-150x150.jpg)
Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy ...
![Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity](https://kbi.media/wp-content/uploads/2024/06/Pieter-Danhieux-150x150.jpg)
Raising the standard of code quality will take a significant change in how developers view and learn security best ...
![How Privacy-By-Design Is Influencing Australia’s Physical Security Environments](https://kbi.media/wp-content/uploads/2024/07/William-Glasson-Genetec-150x150.jpg)
When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current ...
![How to Innovate in a Privacy-Protective Way](https://kbi.media/wp-content/uploads/2024/05/ff-9a5befa174a7d104ff8ed6e4f9bcc608-ff-Nubia-150x150.png)
Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the ...
![Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach](https://kbi.media/wp-content/uploads/2024/05/George-Dragatsis-Hitachi-Vantara-150x150.jpg)
The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the ...
![Exclusive: Zero Trust Security – The way Forward for IT and Security](https://kbi.media/wp-content/uploads/2024/07/kavitha-mariappan-evp-customer-experience-and-transformation_3771b867a06984d36ad77e4151d49472_2000-150x150.jpeg)
In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, ...
![Why Robust Disaster Recovery Is a USP for MSPs](https://kbi.media/wp-content/uploads/2024/07/Jeff-Lee-150x150.jpg)
As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance ...
![Three Force Multipliers To Boost Cybersecurity Protections For Governments](https://kbi.media/wp-content/uploads/2024/07/Mina-Mousa-150x150.jpg)
Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as ‘force ...
![Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity](https://kbi.media/wp-content/uploads/2024/02/Lee-Roebig-Sekuro-1-150x150.jpg)
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to ...
The 2023 Dragos OT Cybersecurity Year in Review is an annual overview and analysis of OT-focused global threat activities, ...
82% of executives want to see an improvement in the sustainability of their workplaces, but the big question is how do ...
![Prioritise Foundational Cloud Security Before Leveraging Generative AI](https://kbi.media/wp-content/uploads/2024/04/Scott-McKinnel-Tenable-150x150.jpg)
An article around how to prioritise foundational cloud security before leveraging Generative AI.
![Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability](https://kbi.media/wp-content/uploads/2022/11/Tenable-Logo2021-1-150x150.png)
Tenable®, the Exposure Management company, today announced the results of a telemetry study examining the scope and impact ...
Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - ...
![Can Being “Compliant” Ever Top Being “Secure”?](https://kbi.media/wp-content/uploads/2023/02/Shinesa-Cambric-150x150.png)
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been ...
Australian organisations should pay attention to 15 high risk vulnerabilities across Microsoft, Apple and Google. Some of ...
Five high risk vulnerabilities from March to watch out for in Microsoft, Adobe, Fortinet, and Samsung