Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the United Kingdom, and Australia - as well as other close allies around the world. At BOKA, the goal reaches beyond just providing essential funding to foster growth of the companies they invest in. The group also brings extensive knowledge, expertise, and experience to supercharge that ...

Podcasts

Episode 268 Deep Dive: Matt Preswick | Democratising Cloud Security – Will Security Become the Enabler to AI Usage?
byKBI.Media

Matt Preswick is the Enterprise Solutions Engineer for Wiz in APJ, with experience in network, email and cloud security at leading security vendors in EMEA and APAC. Before joining Wiz, he lead operations at a Sydney based network analytics startup before returning to Cloud security with Wiz.

Matt is passionate about developing scalable and actionable security practices within APJs largest organisations.

Business News ↓

Why CISOs Need a Voice In the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. The CISO must be supported within the right culture, feel...

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen on the customer. In the past, default solutions to the challenge of reducing third-party cyber risk have focused on SRS, providing cyber risk...

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams

With AustCyber touting a shortfall of 16,000 cybersecurity professionals by 2026, the race to build the nation’s cybersecurity talent and capacity is on. Organisations of all sizes and across every industry vertical are trying to find skilled people to help protect their vital digital assets. But with entry level positions now being paid in excess of $100,000, Australian companies are looking to maximise the return...

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory requirements, the pressures become even more intense. It’s also forcing many organisations to rethink their internal security programs and align them with...
Kavitha Mariappan, ZScaler

Predicting The Future – With Kavitha Mariappan

What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against critical infrastructure targets, especially water and wastewater...

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach. These trends involve changing regulations, confusion about security products, and the drive to save costs through consolidation. Let's explore some...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Ransomware, phishing, hackers, data loss - the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches across the Asia Pacific, according to Verizon’s 2023 Data Breach Investigations Report (DBIR). As Australian national leaders continue to look for ways to...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson cover

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive measures, and the imperative for industry-wide collaboration and...

How the Security of Critical Infrastructure (SOCI) Act is strengthening Australia’s critical infrastructure cybersecurity posture

Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity. Unsurprisingly, they have become attractive targets for cyber criminals seeking financial gain intent on hampering essential services by stealing sensitive data or impeding operational...

The Importance of Undertaking Cyber Risk Quantification

According to Check Point Software’s Threat Intelligence Report on Australia & New Zealand, an organisation in the region has been attacked on average 879 times per week in the last six months. Adding to the complexity for cybersecurity practitioners is the ever-evolving threat landscape that includes a surge in ransomware attacks with over 5,000 victims reported in 2023, marking a 90 per cent increase from the...

Cyber Insurance Isn’t a Free Pass for Australian Businesses

After years of warnings and breaches, the business world has accepted that when it comes to cyber-attacks, it’s a matter of ‘when’, not ‘if’. Not a single organisation is immune to a breach – not even the most secretive and cautious. Down under, a KPMG report in 2023 found a third of Australian businesses – that’s 693,053 organisations – have experienced cybercrime, costing the economy AU$29 billion per year....
Cybersecurity Startup Space: Investing in Early-Stage Companies cover

Cybersecurity Startup Space: Investing in Early-Stage Companies

In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a successful start-up. The Competitive Advantage and Sustainability of Products With numerous companies addressing similar attack vectors, distinguishing...
Navigating the Australian Cybersecurity Market cover

Navigating the Australian Cybersecurity Market

In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the cybersecurity landscape.Collaborative Nature of the Australian...

Where Australian Organisations Go Wrong With Cyber Risk Quantification

In an age where boards and directors are more interested in cybersecurity than ever before - rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ - the best way for CISOs and cybersecurity teams to communicate risk is in terms that the executive committee and directors will understand. As a security leader, that means understanding your audience and the way they prefer to take in...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...

The Conversations Boards Should Have About Cybersecurity

Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they need to be informed participants in cybersecurity discussions....
Episode 148: Lena Smart

Episode 148: Lena Smart

Lena joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was ...
No results found.
Episode 138: Nicholas Boyle

Episode 138: Nicholas Boyle

Nick Boyle is a partner in the IP & Technology team at DLA Piper, and is based in Sydney. He advises clients on data ...
Episode 96: Jason Yakencheck

Episode 96: Jason Yakencheck

Jason is a Associate Partner at IBM with a strong background in project management, cybersecurity, cloud, and strategic ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Why Robust Disaster Recovery Is a USP for MSPs

The strategic use of cloud technology has become a cornerstone for businesses who wish to stay competitive and adaptable in today’s evolving landscape. However, amidst the rapid enthusiasm to adopt and optimise cloud resources, crucial considerations such as security and disaster recovery are often overlooked in spite that spending on security, risk, and compliance remains high regardless of the economic...

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

The most effective third-party risk management (TPRM) programmes prioritise risk remediation alongside risk identification. While security ratings services (SRS) have long focused on risk identification, the burden of curation and remediation has traditionally fallen on the customer. In the past, default solutions to the challenge of reducing third-party cyber risk have focused on SRS, providing cyber risk...

Three Force Multipliers To Boost Cybersecurity Protections For Governments

Cyber threats are a serious challenge that governments worldwide are dealing with every day. A cyberattack can cause breach of data or information, cost time and money to resolve or cause downtime impacting operations. For the past 10 years, an annual CIO survey in the US has found cybersecurity to be the number one concern for state and local governments. In response, more and more IT teams are implementing more...

Small Businesses Can Pull Their SOCs Up

Introduction The ever-present threat of cyberattacks and a rapidly changing technological landscape have forced organisations of all sizes, particularly small businesses, to prioritise cybersecurity. An increased focus on centralised security operations for companies handling sensitive data, processing payments, or undergoing digital transformation is pushing more organisations towards Security Operations Centres....
No results found.