Romantic Chatbots – To Be, or Not To Be
Introduction
Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity ...
The British Library falls victim to Rhysida, a ransomware group employing a "double extortion" tactic. With global ...
In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President and General Manager of Security ...
SEATTLE – April 9, 2024 – ExtraHop®, a leader in cloud-native network detection and response (NDR), today announced the ...
Expanded role includes commercial, industrial, and healthcare segments
Cloudflare enters new market; acquisition will enhance observability tools within Cloudflare's developer platform to keep ...
Podcasts
Business News ↓
Fortinet has recognised the outstanding achievements of its partners, who have significantly contributed to enhancing ...
SYDNEY, Australia – April 15, 2024 - Avocado Consulting announces an expanded collaboration with identity security ...
VAST’s multi-petabyte scale data platform now supports AI workflows in Google Cloud and brings new VAST DataSpace and VAST ...
Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was ...
Virtual attendance at Annual General Meetings (AGM) has soared in recent years, providing unheralded levels of engagement, ...
The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs ...
No results found.
Nick Boyle is a partner in the IP & Technology team at DLA Piper, and is based in Sydney. He advises clients on data ...
Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic ...
ARNECC, ELN, ELNO, ECNL, PEXA...
A recent cyber-attack incident against a property settlement transaction processed ...
No results found.
Markets & Trading
YOUR SECURITY NEWSFEED
The KBI Dossier
The Cybersecurity news feed delivered straight to your Inbox.
Technology News ↓
Growing the size of the security team, and increasing user awareness of the signs of attack, may not be enough to ...
An Overview
The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers ...
. Our dependency on open-source component is going to increase over time and implementing these five steps will help ...
Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Plain English is increasingly important to securing APIs against coding errors and business logic abuse.
While still nascent, generative AI and no-code ClickOps solutions show immense promise for augmenting and spreading ...
Rapid digitisation means that organisations are now more connected than ever. Most organisations now host a combination of ...
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 ...
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of ...
As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the ...
Introduction
In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who ...
Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue ...
Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still ...
While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in ...
As the range of cloud services on offer grows, one might expect a corresponding increase in vulnerabilities - but for ...
The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make ...
Experts in Australia and New Zealand predict critical infrastructure owners will enhance operational technology security ...
Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a ...
Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are ...
Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - ...
Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, ...
An article around how to prioritise foundational cloud security before leveraging Generative AI.
No results found.