No results found.
No results found.
No results found.

Podcasts

Episode 320 Deep Dive: Kavitha Mariappan | The Future of Data Protection
byKBI.Media

In this episode, we sit down with Kavitha Mariappan, Chief Transformation Officer at Rubrik, as she unpacks data protection and the critical importance of cyber resilience. Kavitha challenges the industry’s tendency to hyper-focus on prevention and detection, advocating instead for a holistic approach that integrates resilience and recovery as boardroom imperatives. She shares insights from Rubrik Zero Labs on the real-world challenges organizations face when recovering from ransomware attacks, and highlights the often-overlooked need to make backup, recovery, and risk mitigation a core part of business continuity and security strategy. The conversation covers the business impact of breaches—including monetary loss, reputational risk, and regulatory implications—while emphasizing the growing complexity of identity management in the age of AI and the need for interoperability between security domains. Kavitha also stresses the role of executive leadership in driving change and the importance of public-private collaboration to shape standards and frameworks for a secure digital future.

Kavitha Mariappan, Chief Transformation Officer, Rubrik

Kavitha leads Rubrik’s efforts to accelerate enterprise transformation and deepen executive engagement, with a focus on expanding Rubrik’s footprint across the Global 2000 and public sector decision-makers. She partners across the GTM organization, shaping Rubrik’s CXO narrative, championing value economics, and unlocking new revenue streams. Prior to Rubrik, Kavitha was EVP of Customer Experience & Transformation at Zscaler, where she built and scaled the company’s CXO and Transformation Practice. She holds a B.Eng. in Communication Engineering from the Royal Melbourne Institute of Technology, Australia, and an M.S. in Cybersecurity Risk and Strategy from NYU School of Law and Tandon School of Engineering.

No results found.
RedCurl’s Ransomware Debut

RedCurl’s Ransomware Debut

Introduction This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data exfiltration. This shift to ransomware marks a significant evolution in its tactics. This new ransomware, which we have named QWCrypt based on a self-reference ‘qwc’ found within the executable, is previously ...
No results found.

Business News ↓

NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud storage to video conferencing, it’s worth getting the setup right....

Alleged Russian Hackers Target Norwegian Dam

Overview This wasn’t a super sophisticated cyber attack; it was someone logging into a control system with too little security and opening a dam valve all the way. While the impact was minimal - 447 litres/second of flooding - it’s a reminder that the same digital world that provides us so many societal benefits has a soft underbelly if not properly secured. Just like you wouldn’t leave your front door unlocked,...

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John Harding, general manager – managed services, Konica Minolta Australia,...

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. It is estimated that 1.3 million technology workers will be needed in Australia by 2030 to meet industry demand. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how: Creating Citizen...
The Blind Spot In Your Cyber Strategy cover

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid the increasingly sophisticated threats. Start With The Basics A...

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the types of threats remain similar, they have become more sophisticated due to...
WTF is Happening in Tech? cover

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not hide his skepticism toward Kubernetes, the container orchestration tool...

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Introduction Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.   Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of cyber-attacks. The first CERT, the CERT/CC, was...

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

 Asadullah (Asad) Rathore, Head of Professional Services - cyber security and AI consulting, Excite Cyber (ASX:EXT)  As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But...

How Unchecked Third-Party Access is Undermining Supply Chains

In the modern global economy, supply chains are no longer just physical networks but have become vast digital ecosystems. At the heart of these systems lies a challenge that is rapidly gaining prominence among cybersecurity professionals: third-party digital access. While companies have invested heavily in internal cybersecurity, the true vulnerability often lies just outside their walls, in the hands of partners,...

7 Reasons Certifications Are Critical to Secure Communications

Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and operations are paralyzed. Worse yet, you have no way of getting in touch with your employees to let them know what is going on. This is no hypothetical...

EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare

With the new financial year approaching, Australian organisations face a pressing imperative to strengthen their cyber defences and heighten their vigilance against cyberwarfare. Modern cyberwarfare is marked by a surge in state-sponsored attacks, the weaponisation of artificial intelligence, and a growing emphasis on targeting critical infrastructure amid rising geopolitical tensions. Recent Armis research shows 9...

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

In an increasingly digital world, Australian businesses are more vulnerable than ever to one of the most dangerous yet underestimated cybersecurity risks: insider threats. These threats, which originate from within an organisation, pose a unique challenge as they often fly under the radar due to the use of valid credentials and seemingly legitimate access.  However, they are potent and can result not just in loss...
Uncomfortable Truths Behind Cybersecurity Failures cover

Uncomfortable Truths Behind Cybersecurity Failures

In Episode 4 of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed what’s really dragging security down in modern organisations. And spoiler, it’s not the hackers. If you’re someone in tech, security, or just trying to make sense of how to run a safer, smarter organisation, this one is for you. No Longer A Departmental Concern Scott kicked things off by challenging the old school idea that...
When Priorities Collide, How Do You Make the Right Call? cover

When Priorities Collide, How Do You Make the Right Call?

In Episode 2 of the DevSecOops podcast, hosts Tom Walker, James Vincent, and Scott Fletcher explored one of the biggest yet most overlooked challenges in organisations today: how to make the right decisions, especially when business, technology, and security priorities clash or collide. So, how can organisations balance these three? Equal Understanding on All Fronts The conversation kicked off with a message that...

How a Veteran Project Manager Tames Cyber Chaos

Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a guest a special guest Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity. Natalie’s reflection on the challenges of delivering cyber projects in the high-speed project delivery world. Despite investment in...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud storage to video conferencing, it’s worth getting the setup right....

Alleged Russian Hackers Target Norwegian Dam

Overview This wasn’t a super sophisticated cyber attack; it was someone logging into a control system with too little security and opening a dam valve all the way. While the impact was minimal - 447 litres/second of flooding - it’s a reminder that the same digital world that provides us so many societal benefits has a soft underbelly if not properly secured. Just like you wouldn’t leave your front door unlocked,...

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John Harding, general manager – managed services, Konica Minolta Australia,...

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. It is estimated that 1.3 million technology workers will be needed in Australia by 2030 to meet industry demand. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how: Creating Citizen...
No results found.
No results found.
No results found.
No results found.
No results found.
What in the Cloud?

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. ...
No results found.
No results found.
No results found.
No results found.