
In 2024, a sophisticated credential stuffing attack targeted The Iconic, a leading Australian online fashion retailer. ...

The annual AUSCERT conference, a major gathering for cybersecurity professionals, industry leaders, and academics, ...

Robots that escape from police, algorithms that unwittingly conspire to create $23 million price tags, and chatbots whose ...
No results found.
A new report released by Commvault has revealed a significant gap between perceived and actual cyber readiness among ...
Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data
New Solution Protects Against Accidental and ...
Singapore, July 9, 2025 – Cisco, the worldwide technology leader, today announced the appointment of Ben Dawson as the new ...
No results found.
No results found.
No results found.
No results found.
Business News ↓
Bitdefender has announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security ...
Auckland/Sydney - 18 June 2025— Genetec Inc. (“Genetec”), a global leader in enterprise physical security software, today ...
CrowdStrike Falcon For AWS Security Incident Response Strengthens Cyber Resilience For AWS Customers
New program offers AWS Security Incident Response customers best-in-class Falcon platform protection at preferred ...
No results found.

Anna Perez, business development manager, Wavelink and Connected Health
Healthcare providers must continue to ...
In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these ...

In this episode, we are joined by EJ WISE (Principal and Founder - Wise Law). From tailoring preparedness measures for ...
No results found.

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons ...

A class action lawsuit has been filed against the telecommunications company Optus by former and current customers whose ...

My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been ...
No results found.

Introduction
Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity ...

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The ...
No results found.
Markets & Trading
YOUR SECURITY NEWSFEED
The KBI Dossier
The Cybersecurity news feed delivered straight to your Inbox.
Technology News ↓

Introduction
With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses ...

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked ...

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role ...
No results found.

By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies
As more economies around the ...

Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously ...

SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a ...
No results found.

Introduction
Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations ...

Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.

Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like ...
No results found.

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with ...

Discover why hospitals and healthcare providers are prime targets for cyberattacks and how strategies like ...

American Water suspends online and billing services after a significant cyberattack. Read post to know how ...
No results found.

Introduction
It’s very hard to catch a ball in flight without being able to make real-time calculations based on a ...

Are we there yet with quantum computing? Paddy McGuinness, former UK Deputy National Security Advisor and current Senior ...

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and ...
No results found.

Rising cybercrime rates in Australia and New Zealand are an escalating concern as cybercriminals aren't necessarily ...

Tom Casey Senior Vice President, Products & Technology at Splunk recently presented at Cisco Live in Melbourne about ...

NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation ...
No results found.
Experts in Australia and New Zealand predict critical infrastructure owners will enhance operational technology security ...
Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a ...

Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are ...
No results found.
Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, ...

Modern cyberwarfare is a rising threat for Australian organisations and requires proactive exposure management for ...

An article around how to prioritise foundational cloud security before leveraging Generative AI.
No results found.
No results found.
No results found.