No results found.

Podcasts

Episode 265 Deep Dive: Luke Hargreaves | Sustainable Technology – What Really Matters
byKBI.Media

A highly driven technical professional with 20+ years of experience in the IT industry. Luke believes in the limitless potential of technology to sustainably transform the lives of people, and the world as a whole. He derives genuine joy to be doing what he is doing, and brings this enthusiasm everywhere he goes..

No results found.
No results found.

Business News ↓

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory requirements, the pressures become even more intense. It’s also forcing many organisations to rethink their internal security programs and align them with...
Kavitha Mariappan, ZScaler

Predicting The Future – With Kavitha Mariappan

What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against critical infrastructure targets, especially water and wastewater...

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach. These trends involve changing regulations, confusion about security products, and the drive to save costs through consolidation. Let's explore some...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Ransomware, phishing, hackers, data loss - the list of cyber threats to enterprises goes on. Threats to cybersecurity have reached ground zero, with social engineering, system intrusion and basic web application attacks representing 93 percent of data breaches across the Asia Pacific, according to Verizon’s 2023 Data Breach Investigations Report (DBIR). As Australian national leaders continue to look for ways to...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson cover

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive measures, and the imperative for industry-wide collaboration and...

How the Security of Critical Infrastructure (SOCI) Act is strengthening Australia’s critical infrastructure cybersecurity posture

Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity. Unsurprisingly, they have become attractive targets for cyber criminals seeking financial gain intent on hampering essential services by stealing sensitive data or impeding operational...

The Importance of Undertaking Cyber Risk Quantification

According to Check Point Software’s Threat Intelligence Report on Australia & New Zealand, an organisation in the region has been attacked on average 879 times per week in the last six months. Adding to the complexity for cybersecurity practitioners is the ever-evolving threat landscape that includes a surge in ransomware attacks with over 5,000 victims reported in 2023, marking a 90 per cent increase from the...

Cyber Insurance Isn’t a Free Pass for Australian Businesses

After years of warnings and breaches, the business world has accepted that when it comes to cyber-attacks, it’s a matter of ‘when’, not ‘if’. Not a single organisation is immune to a breach – not even the most secretive and cautious. Down under, a KPMG report in 2023 found a third of Australian businesses – that’s 693,053 organisations – have experienced cybercrime, costing the economy AU$29 billion per year....
Cybersecurity Startup Space: Investing in Early-Stage Companies cover

Cybersecurity Startup Space: Investing in Early-Stage Companies

In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a successful start-up.The Competitive Advantage and Sustainability of ProductsWith numerous companies addressing similar attack vectors, distinguishing...
Navigating the Australian Cybersecurity Market cover

Navigating the Australian Cybersecurity Market

In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the cybersecurity landscape.Collaborative Nature of the Australian...

Where Australian Organisations Go Wrong With Cyber Risk Quantification

In an age where boards and directors are more interested in cybersecurity than ever before - rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ - the best way for CISOs and cybersecurity teams to communicate risk is in terms that the executive committee and directors will understand. As a security leader, that means understanding your audience and the way they prefer to take in...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...

The Conversations Boards Should Have About Cybersecurity

Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they need to be informed participants in cybersecurity discussions....

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...

The Glimpse at the Future of Software Academia

Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has its’ origins in simplistic terms - via code written on manual punch cards and then fed into...

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the vast majority of Australian cybersecurity and IT leaders (68%) view cloud infrastructure as the greatest source of cyber risk in their organisation....
Episode 111: Peter Soulsby

Episode 111: Peter Soulsby

Peter advises CISOs on how to increase their business's Cyber Resilience by transforming their Cybersecurity landscape. ...
Episode 109: Anne Leslie

Episode 109: Anne Leslie

Anne Leslie is Cloud Risk and Controls Leader for IBM Cloud for Financial Services in Europe. Prior to joining IBM, her ...
No results found.
Episode 33: Jen Willmer

Episode 33: Jen Willmer

Jen has extensive experience and expertise in Corporate and Commercial Law, and Cyber Security and IT, with a background ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

When it comes to enterprise cybersecurity, nothing is set in stone. With a constantly shifting threat landscape on one hand and evolving tools on the other, security teams can often feel overworked and overwhelmed. When you add the additional layer of regulatory requirements, the pressures become even more intense. It’s also forcing many organisations to rethink their internal security programs and align them with...

How to Protect Against the Rising Tide of Password Spray Attacks

A recent wave of large-scale password spray attacks has cybersecurity firms scrambling to warn their clients around the world. These attacks exploit weak credentials to gain unauthorised access to critical systems, potentially causing significant financial and reputational damage. Password spray attacks involve automated attempts to gain access to accounts using common passwords across a large number of usernames....

Australian Energy Sector Grappling with Rising Ransomware Threat

Australia's energy industry, a critical foundation of the country’s economy, is facing an increasing and potentially costly challenge: ransomware attacks. These cyber assaults, where malicious software encrypts critical data and holds it hostage until a ransom is paid, are becoming an increasingly common occurrence, disrupting everything from energy generation to transmission networks and billing systems. The...

Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Introduction Passwords are ingrained in enterprises with traditional identity lifecycle stages, which exposes them to increasingly sophisticated cyber attacks that rely on stolen login credentials for success like phishing. Phishing is one of the greatest cybersecurity risks that enterprises face – in fact, stolen passwords are one of the largest threat vectors compromising online security today with over 80 per...
No results found.
No results found.
No results found.