by Richard Sorosina | Jan 24, 2024 | Critical Infrastructure, Security Operations
In an era where the security landscape is continually shifting, the words of American film producer Howard W Koch resonate: “There is no security for any of us unless there is security for all.” While the words did not originally relate to cybersecurity,...
by The Production Team | Jan 23, 2024 | Artificial Intelligence, Threat Intelligence
Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts,...
by The Production Team | Jan 23, 2024 | Application Security, Data Management
Introduction In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of...
by Darren Reid | Jan 23, 2024 | Artificial Intelligence, Exposure Management, Security Operations
Artificial intelligence (AI), according to Forbes “is the fastest-adopted technology in history.” More specifically, generative AI tool ChatGPT in February 2023 became the first tech application to reach 100 million unique users in its first two months. AI in all its...
by Andrew Philp | Jan 23, 2024 | Risk Management, Social Engineering, Zero Trust
We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with the rise of AI-powered exploits and increasingly sophisticated attacks, it’s no longer fair — or effective — to blame individuals for succumbing to...
by Bitdefender | Jan 22, 2024 | Crypto, Blockchain, and NFTs, Threat Intelligence
Introduction As of October 2023, researchers at Bitdefender Labs have been actively keeping tabs on steam-jacking attacks against high-profile YouTube accounts used to conduct myriad crypto doubling scams. Fast forward to 2024; our investigation into the fraudulent...
by Satnam Narang | Jan 22, 2024 | SMB
Credential Stuffing – A Growing Hacking Technique There is a new hack scheme in town that has affected thousands of Australians who own online accounts with some of our biggest brands. Known as ‘credential stuffing’, scammers are taking advantage of...
by Ashley Diffey | Jan 19, 2024 | Identity & Access Management
In an increasingly digital world where online financial exchanges are commonplace, identity (ID) data has become critical. This is because organisations need to be confident that the people they interact with are real humans, and the correct humans they claim....
by Leonardo Hutabarat | Jan 18, 2024 | Critical Infrastructure, IoT & Robotics, Security Operations
From power and water grids to transportation and communication networks, critical infrastructure underpins much of daily urban life. These vital components ensure the smooth flow of resources and information, which means any disruptions that occur have significant...
by Shreyans Mehta | Jan 17, 2024 | Application Security, Cloud Security
Organisational Use of APIs Application Programming Interfaces (APIs) have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. ...
by Andrew Slavkovic | Jan 16, 2024 | Artificial Intelligence, Reports & Predictions
In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced...
by Jesse Booth | Jan 10, 2024 | Executive Communication, Security Awareness
The growing scope and severity of cyber threats targeting Australian businesses this past year has put a spotlight on the need for greater security measures. It has even reached national attention as the country’s Home Affairs Minister recently announced the...
by The Production Team | Jan 10, 2024 | GENERAL, Vendor Management
Partnerships play a vital role in meeting customer demands and driving success for organisations. In a recent episode of the KBKast podcast, host Karissa Breen sat down with Raj Sharma, from Palo Alto Networks, to discuss the importance of strategic partnerships and...
by Brenton Steenkamp | Jan 9, 2024 | Compliance & Legal
Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most cyber secure nation by 2030. However, according to Apple, Australia is one of the top four countries for cyber-attacks – behind the US, the...
by George Moawad | Jan 8, 2024 | Data Management, Security Operations, Vendor Management
Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue technologies, towards modern digital infrastructure. At the same time, governments and citizens have become increasingly concerned about privacy...
by Sunny Bedi | Dec 21, 2023 | Artificial Intelligence, Reports & Predictions
With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year. Prediction: AI Will Be Your Best Work Buddy One of the most exciting ideas for workplace productivity is the deployment of AI assistants that...
by Ben Canning | Dec 21, 2023 | Artificial Intelligence, Reports & Predictions
With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial...
by Chern-Yue Boey | Dec 19, 2023 | Artificial Intelligence, Identity & Access Management, OT Security
With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of...
by Annie Haggar | Dec 12, 2023 | ANZ, Compliance & Legal, Crisis Management, Geo-Political & Military, IoT & Robotics, OT Security
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia’s blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and...
by Vaile Mexted | Dec 11, 2023 | Artificial Intelligence, Security Awareness, Social Engineering
Australians have experienced a surge in scams, with losses amounting to a staggering $3.1 billion in the past year alone. From false billing scams – responsible for more than $22 million in losses in 2023, to payment redirection trickery and more, the impact on both...
by Steven Wood | Dec 5, 2023 | Leadership, Work & Careers
The cybersecurity sector is at a crossroads, grappling with what can only be described as an existential crisis. The gap in cybersecurity skills has grown to alarming proportions with Australia boasting a shortage of 25,000 to 30,000 cybersecurity professionals in...
by Thomas Fikentscher | Dec 1, 2023 | Artificial Intelligence, Reports & Predictions, Supply Chain
Over 2023, we’ve seen what I like to call the ‘verticalisation of cybersecurity’ taking effect, in that cybersecurity has finally taken centre stage in business discussions. If you see event agendas for example, it is now featured as a key business conference topic at...
by Richard Sorosina | Dec 1, 2023 | Reports & Predictions, Risk Management
Reflecting on the past year, we’ve witnessed a notable transformation in how organisations perceive and prioritise their cybersecurity strategies, largely driven by evolving perspectives on its significance, impact and value it has from a business perspective,...
by Lindsay Brown | Nov 30, 2023 | Leadership, Learning & Education, Work & Careers
Australia remains in the midst of a skills shortage, with slow hiring conditions occurring across the nation. Topping the most desired positions are cybersecurity professionals, according to recruiter Hays’ Salary Guide. With the increasing significance cybersecurity...
by The Production Team | Nov 29, 2023 | Identity & Access Management, Security Awareness, Social Engineering
To address and insulate themselves from the growing trend of cyber security breaches, more businesses are turning to insurance agencies for cyber insurance policies. While these policies have been around in some form since the late 1990s, the fast growing threat...
by Nozomi Networks | Nov 29, 2023 | Critical Infrastructure, Microsegmentation, OT Security, Reports & Predictions
Experts in Australia and New Zealand predict critical infrastructure owners will enhance operational technology security as legislative changes take shape, but skills shortages and visibility over networks remain key issues Nozomi Networks Inc. says Australia and New...
by Mark Jones | Nov 24, 2023 | Risk Management, Security Awareness
With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is...
by Pieter Danhieux | Nov 23, 2023 | ANZ, AUKUS
It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds...
by The Production Team | Nov 19, 2023 | Executive Communication, Leadership
In recent years, the internet has become a breeding ground for toxicity. People are more emboldened online, hiding behind pseudonyms and expressing their more divisive and extreme views. This has resulted in a lack of constructive debate and a prevalence of insults...
by Karissa Breen | Nov 17, 2023 | Executive Communication, Leadership, Risk Management
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive...
by Cam Perry | Nov 15, 2023 | Crypto, Blockchain, and NFTs
Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial...
by Shinesa Cambric | Nov 13, 2023 | Assessment & Audit, Compliance & Legal, Zero Trust
In a 2016 case involving the North Korean-based Lazarus Group and the Federal Reserve Bank of New York it did. As a result of following compliance procedures related to red flags on an address, the Federal Reserve Bank of New York blocked $850 million USD from being...
by Simon Perry | Nov 13, 2023 | Security Awareness, Threat Intelligence
During a cyber attack, the process of compromising a machine rarely involves a single step. Instead, the chain of execution not only involves multiple events, but also a continuous evolution of attacking patterns, making it increasingly difficult to identify the...
by Morey Haber | Nov 13, 2023 | Artificial Intelligence, Identity & Access Management, Reports & Predictions
With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity. The past year was defined by some remarkable technological advancements, especially in the realm of...
by The Production Team | Nov 7, 2023 | Work & Careers
In a recent episode of the KBKast podcast, host Karissa Breen sat down with Amy Meyer, an Australian expat who has successfully carved out a career in the United States. The conversation touched upon the unique challenges faced by Australians seeking employment in the...
by Les Williamson | Nov 2, 2023 | Critical Infrastructure
In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances. Small to medium sized players have been under particular pressure,...
by The Production Team | Nov 2, 2023 | Data Management
Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don’t take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go...
by Karissa Breen | Nov 2, 2023 | Innovation, Product Development
Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney. The event kicked off with some drinks and...
by The Production Team | Nov 1, 2023 | Artificial Intelligence, Governance & Risk, Reports & Predictions, Zero Trust
Atlanta, GA – October 31, 2023 – BeyondTrust, the worldwide leader in intelligent identity and access security, today released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections, authored by BeyondTrust experts Morey J....
by Matias Madou | Nov 1, 2023 | Application Security
Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces...
by CyAmast | Oct 30, 2023 | CAASM, IoT & Robotics
The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various...
by CyAmast | Oct 28, 2023 | CAASM, IoT & Robotics, Sustainability
INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it’s critical to remember one factor that is critical to the technology’s existence and how, without it, the entire system could implode. Naturally, we’re referring to...
by The Production Team | Oct 26, 2023 | Geo-Political & Military, Middle East and North Africa
The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will...
by Scott Hesford | Oct 24, 2023 | Security Awareness
An Overview If there’s one thing regulated entities don’t want to hear from their regulator, it’s that they’re “rapidly running out of patience” with the sector’s slow progress on a mandate or directive. Yet that’s exactly where Australia’s financial sector finds...
by Pieter Danhieux | Oct 23, 2023 | Leadership, Work & Careers
Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply. According to industry estimates, the number of cybersecurity job...
by The Production Team | Oct 19, 2023 | Reports & Predictions
IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation. NEWS HIGHLIGHTS The global study reveals that 61% of those surveyed...
by The Production Team | Oct 12, 2023 | Leadership
October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents,...
by Rafi Katanasho | Oct 9, 2023 | Cloud Security
The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years. Part of the attractiveness of shifting to the cloud is that it ushers in a more modular approach to building...