by Pieter Danhieux | Dec 11, 2024 | Product Development
Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation. The idea of baking security into software right from the start of the development lifecycle is going from strength to strength, having...
by Bitdefender | Dec 5, 2024 | Security Awareness, Threat Intelligence
As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they aren’t the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing...
by Johan Fantenberg | Dec 5, 2024 | Artificial Intelligence, Security Awareness, Social Engineering
Introduction Australia has seen an increasing procession of deepfakes causing real-world concern. An Australian man lost $80,000 in cryptocurrency after viewing a deepfake video of a public figure encouraging an investment that was in fact a scam – a common...
by Gareth Cox | Dec 5, 2024 | Security Operations
There is a rising appetite for SOC modernisation and transformation among Australian companies, driven by a desire to enhance security maturity, improve resilience against cyberattacks, and reduce risk in a digitally-driven world. SOCs today are challenged by a...
by Craig Stockdale | Dec 5, 2024 | Cloud Security
Rising cybercrime rates in Australia and New Zealand are an escalating concern as cybercriminals aren’t necessarily improving their methods but are taking advantage of cybersecurity gaps. The rise in ransomware attacks stems not from advanced techniques but from...
by Mohan Veloo | Dec 5, 2024 | Artificial Intelligence
AI is transforming industries worldwide, and Australia is no exception. Australia, despite previously lagging in adoption of AI technologies, is now charging ahead. But as Australian organisations navigate this AI-driven revolution, they face an intricate balancing...
by William Glasson | Dec 2, 2024 | Physical Security
Businesses thrive on periods of sustained growth, but it’s important to have systems and security settings that can keep up with the requirements of an expanding physical and geographical footprint. When organisations enter a high-growth phase, regardless of whether...
by Leon Poggioli | Nov 28, 2024 | Critical Infrastructure, Identity & Access Management, OT Security, Reports & Predictions
The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise...
by Alyssa Blackburn | Nov 28, 2024 | Artificial Intelligence, Governance & Risk, Leadership
Introduction As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a...
by Jeff Wallace | Nov 26, 2024 | Identity & Access Management
To help organisations achieve phishing-resistance at scale, we recently announced the general availability of Yubico Enrollment Suite – a set of offerings that includes Yubico FIDO Pre-reg and the brand new YubiEnroll – which delivers choice to enterprises in how they...
by Hank Clark | Nov 26, 2024 | Artificial Intelligence
Cyber teams are currently stretched, and cyber-attacks are becoming increasingly sophisticated and frequent. There’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber: automating threat detection, analysing vast amounts of data...
by Wayne Dorris | Nov 26, 2024 | ANZ
Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all...
by Simon Howe | Nov 26, 2024 | Risk Management
Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices. A recent survey found 63% of Australians had been caught up in a cyber attack or data breach in the past year, with half finding themselves in...
by Morey Haber | Nov 26, 2024 | Identity & Access Management
With Australian and international authorities calling out lateral movement incidents multiple times this year, it’s clearly an area where improvements are being urgently sought. A key trend to gain momentum this year was the issuance of multi-country-led advisories...
by Terry Tolbert | Nov 26, 2024 | Microsegmentation
Microsegmentation is increasingly becoming a priority for organizations looking to combat rising cyber threats, especially in complex, cloud-based, hybrid, and operational technology (OT) environments. Although its adoption was initially slow due to various...
by Cornelius Mare | Nov 22, 2024 | Security Operations
Managing modern cyber threats is becoming tougher for security operations (SecOps) teams. Attack surfaces are expanding, and threats are becoming more sophisticated. Fortunately, artificial intelligence (AI) and automation provide the speed, precision, and efficiency...
by Satyen Desai | Nov 19, 2024 | Cyber Resilience, Microsegmentation, Zero Trust
The Rise of Breach Readiness in Modern Cybersecurity Businesses today are navigating an increasingly complex digital environment where cyber threats evolve relentlessly. In recent years, cybersecurity has transformed from a niche technical concern to a strategic...
by The Production Team | Nov 18, 2024 | BUSINESS
KBI Media is bringing you a preview of presentations from the upcoming Australian Cyber Security Conference in Melbourne. On 28 November 2024, Dr Ivano Bongiovanni, General Manager, AUSCERT will be unveiling insights from cutting edge research to unpack how decisions...
by Ashley Diffey | Nov 18, 2024 | Identity & Access Management, Risk Management
Many businesses today rely on hybrid IT environments that integrate a complex array of applications, datacentres, and cloud services. While these diverse ecosystems offer flexibility, they also present a critical challenge: identity silos. Fragmented identity and...
by Shane Maher | Nov 12, 2024 | ANZ, Government & Policy
Introduction Australian policymakers are converging on a few challenging issues simultaneously. With a growing population and the tail end of an inflation outbreak, the housing crisis seems set to persist, affecting affordability for years to come. In this context,...
by The Production Team | Nov 4, 2024 | Artificial Intelligence, Cloud Security, Data Management, Sustainability
NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise...
by Matias Madou | Nov 4, 2024 | FinTech
For as long as banks and financial institutions have existed, so too have those seeking to steal from them. The infamous bank robber Willie Sutton, active in the 1920s, famously quipped that he targeted banks “because that’s where the money is.” While the methods have...
by Chuck Suitor | Nov 1, 2024 | Microsegmentation, Zero Trust
Introduction Cyberattacks in the healthcare industry are surging at an unprecedented rate, with fresh breaches making headlines nearly every day. Data from the U.S. Department of Health and Human Services (HHS) shows that major healthcare data breaches have seen a...
by Morey Haber | Nov 1, 2024 | Cyber Resilience
Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications. Australian enterprises of all types have grown accustomed to running their application estates on virtualised server infrastructure. The...
by George Moawad | Nov 1, 2024 | Cyber Resilience
As cybercrime reaches unprecedented levels, the urgency for businesses to bolster their defences is strong. A report from Cybersecurity Ventures[1] predicts that global cybercrime costs will soar to $10.5 trillion annually by 2025, marking a 15% growth per year. This...
by Kerrick Lehman | Oct 31, 2024 | Cloud Security, Critical Infrastructure, Network Security, Reports & Predictions
Introduction According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy. Some might say that’s an alarming...
by The Production Team | Oct 31, 2024 | Exposure Management, Reports & Predictions, Threat Intelligence
In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute...
by Olly Stimpson | Oct 29, 2024 | Personal Security, Security Awareness
As Cybersecurity Awareness Month draws to a close, the message “Cybersecurity is Everyone’s Business” remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian...
by ColorTokens | Oct 24, 2024 | Microsegmentation
As a parent of middle and high schoolers—and with some of their friends still in elementary school—I often find myself answering this familiar question: “When will I ever use math in real life?” It’s a fair question, one I’ve heard many times. So, inspired by my...
by Krishna Kumar | Oct 21, 2024 | Artificial Intelligence, Government & Policy
For Context As Australia’s three levels of government undergo a digital transformation, meeting the increasing demand for efficient, citizen-centric services is critical. Technology plays a central role in this transformation, enabling governments to better connect...
by Anthony Spiteri | Oct 21, 2024 | Cyber Resilience, Data Management, Security Operations
Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia’s regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45...
by John Mackenney | Oct 21, 2024 | Cyber Resilience, Leadership, OT Security, Security Operations
Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised...
by Itzik Swissa | Oct 21, 2024 | Application Security, Supply Chain
Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security...
by Chuck Suitor | Oct 21, 2024 | Microsegmentation, Security Operations, Social Engineering
You walk into a hospital where the power is out, patient records are inaccessible, and life-saving equipment has ground to a halt. It’s a stark reality we could face if we don’t act now. Cyberattacks aren’t just about stolen data anymore....
by The Production Team | Oct 16, 2024 | Cloud Security, Data Management
Watch The Interview Biography Pravjit (Prav) Tiwana is a technology executive with more than two decades of experience building highly scaled, cloud-powered products, services, and businesses. He is senior vice president and general manager responsible for...
by The Production Team | Oct 15, 2024 | Data Management, Executive Communication, Leadership, Security Operations
Watch The Interview Biography Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions...
by Mandy Andress | Oct 15, 2024 | Artificial Intelligence, Cyber Resilience
Introduction The arrival of generative AI and its seemingly endless possibilities also came with a myriad of sophisticated threats. And as organisations move to increasingly complex digital environments and struggle to analyse the exponential growth of security data,...
by Ashvin Kamaraju | Oct 15, 2024 | Personal Security, Security Awareness, SMB
Cybersecurity Awareness Month is an international initiative that focuses on simple ways to protect ourselves, our families, and our businesses from online threats. The 2025 theme “Secure Our World” highlights the pervasiveness of digital technologies that enable...
by The Production Team | Oct 14, 2024 | Cyber Resilience, Data Management, Governance & Risk, Leadership
Watch The Interview Biography Sandeep Singh is Senior Vice President and General Manager, Enterprise Storage at NetApp. Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building...
by ColorTokens | Oct 14, 2024 | Identity & Access Management, Security Awareness, Security Operations, Social Engineering
I’m sure you’ve noticed that whenever a cybersecurity breach makes headlines, the finger often points straight at humans. High-profile incidents like the SolarWinds attack, where human error was cited as a key factor, the recent 23andMe breach blamed on...
by Shachar Menashe | Oct 14, 2024 | Security Operations, Threat Intelligence
On September 23rd, Twitter user Simone Margaritelli (@evilsocket) announced that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which affects almost all Linux distributions, and that the public disclosure will happen on September...
by The Production Team | Oct 11, 2024 | Cloud Security, Cyber Resilience, Data Management, Innovation
Watch The Interview Biography Haiyan Song is EVP & GM, CloudOps @ NetApp. Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with...
by ColorTokens | Oct 11, 2024 | Critical Infrastructure, Microsegmentation
The Landscape American Water, the largest water and wastewater utility in the United States, plays a crucial role in ensuring the availability of safe and reliable drinking water for millions of residents. Recently, the company encountered a significant challenge when...
by The Production Team | Oct 11, 2024 | Cyber Resilience, Data Management, Innovation, Leadership
Watch The Interview Biography Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. At the helm of NetApp’s Cloud Business Unit as the Senior Vice President, General Manager, and Chief Revenue Officer, his focus is on driving growth through...
by Malin Svensson | Oct 10, 2024 | Security Operations
The security industry has long been perceived as a male-dominated field. According to the Royal Melbourne Institute of Technology’s (RMIT) analysis of 2021 Census data, women make up only 16% of Australia’s cybersecurity workforce—a statistic mirrored globally. This...
by The Production Team | Oct 9, 2024 | Cyber Resilience, Data Management, Leadership
Watch The Interview Biography Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance...
by The Production Team | Oct 8, 2024 | Data Management, Product Development
Watch The Interview Biography Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product & solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp,...
by Mark Bowling | Oct 8, 2024 | Network Security
When a cyber incident strikes, the big question on every executive’s mind is, “How bad is it?” Unfortunately, the immediate answer is often, “We don’t know.” Understanding the full scope and impact of a breach can take weeks, if not...