by Ashwin Ram | Jan 15, 2025 | Continuous Business, Cyber Resilience
By Ashwin Ram, Evangelist, Office of the CTO, Check Point Software Technologies Australia & New Zealand The latest report from the Office of the Australian Information Commissioner (OAIC) reveals a troubling trend that boards can no longer afford to ignore: 527...
by Shane Maher | Jan 13, 2025 | Cloud Security
The dominant workplace issue of 2024 was the return to the office with some of the world’s most powerful chief executives shifting millions of workers back into the office. But for chief technology officers, the situation will not get materially simpler. A critical...
by Richard Seiersen | Jan 8, 2025 | Cyber Resilience
1. Prediction: The increasing use of AI will not alter the basics of cybersecurity strategies “While several enterprises are looking for the next best AI solution in an effort to fight fire with fire, I am reminded of the famous Alphonse Karr quote, “The more things...
by Thomas Fikentscher | Jan 8, 2025 | Identity & Access Management
The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity...
by Rajesh Khazanchi | Jan 8, 2025 | Continuous Business, Cyber Resilience
Let me start by wishing everyone Happy Holidays and a great new 2025 ahead. As we exit 2024, I am equally hopeful and worried about the year ahead. While I am concerned that even increased spending on cybersecurity has not slowed down cyberattacks, with increased...
by John Penn | Dec 23, 2024 | Security Awareness, Security Operations
Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay...
by Lee Barney | Dec 20, 2024 | Critical Infrastructure, SMB
“While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we’re seeing is the use of AI-powered tools, with...
by Scott Hesford | Dec 16, 2024 | Identity & Access Management
As cybersecurity threats become more sophisticated, businesses find themselves facing attackers who exploit increasingly complex identity trusts. The proliferation of digital transformation, accelerated by cloud adoption and remote work trends, has expanded...
by Robert Haist | Dec 13, 2024 | AWARDS & RECOGNITION, Cyber Resilience, IWD, Leadership, Reports & Predictions, Security Awareness, Security Operations, SMB, Uncategorized
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating...
by Agnidipta Sarkar | Dec 12, 2024 | Cyber Resilience, Microsegmentation, Threat Intelligence
This blog is dedicated to one of the most influential thinkers of the modern era: mathematical genius, statistician, former options trader, risk analyst, and aphorist Nassim Nicholas Taleb. His noteworthy work, which addresses fundamental issues of randomness,...
by Morey Haber | Dec 11, 2024 | Banking & Finance
Financial institutions are leading the way in their pursuit of adaptive protections against evolving information-stealing threats. Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find...
by Simon Berglund | Dec 11, 2024 | Artificial Intelligence, Governance & Risk
Introduction Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but...
by Pieter Danhieux | Dec 11, 2024 | Product Development
Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation. The idea of baking security into software right from the start of the development lifecycle is going from strength to strength, having...
by Bitdefender | Dec 5, 2024 | Security Awareness, Threat Intelligence
As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they aren’t the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing...
by Johan Fantenberg | Dec 5, 2024 | Artificial Intelligence, Secure Communications, Security Awareness, Social Engineering
Introduction Australia has seen an increasing procession of deepfakes causing real-world concern. An Australian man lost $80,000 in cryptocurrency after viewing a deepfake video of a public figure encouraging an investment that was in fact a scam – a common...
by Gareth Cox | Dec 5, 2024 | Security Operations
There is a rising appetite for SOC modernisation and transformation among Australian companies, driven by a desire to enhance security maturity, improve resilience against cyberattacks, and reduce risk in a digitally-driven world. SOCs today are challenged by a...
by Craig Stockdale | Dec 5, 2024 | Cloud Security
Rising cybercrime rates in Australia and New Zealand are an escalating concern as cybercriminals aren’t necessarily improving their methods but are taking advantage of cybersecurity gaps. The rise in ransomware attacks stems not from advanced techniques but from...
by Mohan Veloo | Dec 5, 2024 | Artificial Intelligence
AI is transforming industries worldwide, and Australia is no exception. Australia, despite previously lagging in adoption of AI technologies, is now charging ahead. But as Australian organisations navigate this AI-driven revolution, they face an intricate balancing...
by William Glasson | Dec 2, 2024 | Physical Security
Businesses thrive on periods of sustained growth, but it’s important to have systems and security settings that can keep up with the requirements of an expanding physical and geographical footprint. When organisations enter a high-growth phase, regardless of whether...
by Leon Poggioli | Nov 28, 2024 | Critical Infrastructure, Identity & Access Management, OT Security, Reports & Predictions
The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise...
by Alyssa Blackburn | Nov 28, 2024 | Artificial Intelligence, Governance & Risk, Leadership
Introduction As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a...
by Jeff Wallace | Nov 26, 2024 | Identity & Access Management
To help organisations achieve phishing-resistance at scale, we recently announced the general availability of Yubico Enrollment Suite – a set of offerings that includes Yubico FIDO Pre-reg and the brand new YubiEnroll – which delivers choice to enterprises in how they...
by Hank Clark | Nov 26, 2024 | Artificial Intelligence
Cyber teams are currently stretched, and cyber-attacks are becoming increasingly sophisticated and frequent. There’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber: automating threat detection, analysing vast amounts of data...
by Wayne Dorris | Nov 26, 2024 | ANZ
Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all...
by Simon Howe | Nov 26, 2024 | Risk Management
Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices. A recent survey found 63% of Australians had been caught up in a cyber attack or data breach in the past year, with half finding themselves in...
by Morey Haber | Nov 26, 2024 | Identity & Access Management
With Australian and international authorities calling out lateral movement incidents multiple times this year, it’s clearly an area where improvements are being urgently sought. A key trend to gain momentum this year was the issuance of multi-country-led advisories...
by Terry Tolbert | Nov 26, 2024 | Microsegmentation
Microsegmentation is increasingly becoming a priority for organizations looking to combat rising cyber threats, especially in complex, cloud-based, hybrid, and operational technology (OT) environments. Although its adoption was initially slow due to various...
by Cornelius Mare | Nov 22, 2024 | Security Operations
Managing modern cyber threats is becoming tougher for security operations (SecOps) teams. Attack surfaces are expanding, and threats are becoming more sophisticated. Fortunately, artificial intelligence (AI) and automation provide the speed, precision, and efficiency...
by Satyen Desai | Nov 19, 2024 | Cyber Resilience, Microsegmentation, Zero Trust
The Rise of Breach Readiness in Modern Cybersecurity Businesses today are navigating an increasingly complex digital environment where cyber threats evolve relentlessly. In recent years, cybersecurity has transformed from a niche technical concern to a strategic...
by The Production Team | Nov 18, 2024 | BUSINESS
KBI Media is bringing you a preview of presentations from the upcoming Australian Cyber Security Conference in Melbourne. On 28 November 2024, Dr Ivano Bongiovanni, General Manager, AUSCERT will be unveiling insights from cutting edge research to unpack how decisions...
by Ashley Diffey | Nov 18, 2024 | Identity & Access Management, Risk Management
Many businesses today rely on hybrid IT environments that integrate a complex array of applications, datacentres, and cloud services. While these diverse ecosystems offer flexibility, they also present a critical challenge: identity silos. Fragmented identity and...
by Shane Maher | Nov 12, 2024 | ANZ, Government & Policy
Introduction Australian policymakers are converging on a few challenging issues simultaneously. With a growing population and the tail end of an inflation outbreak, the housing crisis seems set to persist, affecting affordability for years to come. In this context,...
by The Production Team | Nov 4, 2024 | Artificial Intelligence, Cloud Security, Data Management, Sustainability
NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise...
by Matias Madou | Nov 4, 2024 | Banking & Finance
For as long as banks and financial institutions have existed, so too have those seeking to steal from them. The infamous bank robber Willie Sutton, active in the 1920s, famously quipped that he targeted banks “because that’s where the money is.” While the methods have...
by Chuck Suitor | Nov 1, 2024 | Continuous Business, Microsegmentation, Zero Trust
Introduction Cyberattacks in the healthcare industry are surging at an unprecedented rate, with fresh breaches making headlines nearly every day. Data from the U.S. Department of Health and Human Services (HHS) shows that major healthcare data breaches have seen a...
by Morey Haber | Nov 1, 2024 | Cyber Resilience
Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications. Australian enterprises of all types have grown accustomed to running their application estates on virtualised server infrastructure. The...
by George Moawad | Nov 1, 2024 | Cyber Resilience
As cybercrime reaches unprecedented levels, the urgency for businesses to bolster their defences is strong. A report from Cybersecurity Ventures[1] predicts that global cybercrime costs will soar to $10.5 trillion annually by 2025, marking a 15% growth per year. This...
by Kerrick Lehman | Oct 31, 2024 | Cloud Security, Critical Infrastructure, Network Security, Reports & Predictions
Introduction According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy. Some might say that’s an alarming...
by The Production Team | Oct 31, 2024 | Exposure Management, Reports & Predictions, Threat Intelligence
In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute...
by Olly Stimpson | Oct 29, 2024 | Personal Security, Security Awareness
As Cybersecurity Awareness Month draws to a close, the message “Cybersecurity is Everyone’s Business” remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian...
by ColorTokens | Oct 24, 2024 | Microsegmentation
As a parent of middle and high schoolers—and with some of their friends still in elementary school—I often find myself answering this familiar question: “When will I ever use math in real life?” It’s a fair question, one I’ve heard many times. So, inspired by my...
by Krishna Kumar | Oct 21, 2024 | Artificial Intelligence, Government & Policy
For Context As Australia’s three levels of government undergo a digital transformation, meeting the increasing demand for efficient, citizen-centric services is critical. Technology plays a central role in this transformation, enabling governments to better connect...
by Anthony Spiteri | Oct 21, 2024 | Cyber Resilience, Data Management, Security Operations
Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia’s regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45...
by John Mackenney | Oct 21, 2024 | Cyber Resilience, Leadership, OT Security, Security Operations
Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised...
by Itzik Swissa | Oct 21, 2024 | Application Security, Supply Chain
Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security...
by Chuck Suitor | Oct 21, 2024 | Microsegmentation, Security Operations, Social Engineering
You walk into a hospital where the power is out, patient records are inaccessible, and life-saving equipment has ground to a halt. It’s a stark reality we could face if we don’t act now. Cyberattacks aren’t just about stolen data anymore....
by The Production Team | Oct 16, 2024 | Cloud Security, Data Management
Watch The Interview Biography Pravjit (Prav) Tiwana is a technology executive with more than two decades of experience building highly scaled, cloud-powered products, services, and businesses. He is senior vice president and general manager responsible for...
by The Production Team | Oct 15, 2024 | Data Management, Executive Communication, Leadership, Security Operations
Watch The Interview Biography Krish Vitaldevara is a passionate product leader and engineer with demonstrated success at building compelling multiyear strategies for large platform and product teams and delivering significant impact for large enterprises and billions...