No results found.
No results found.
No results found.

Podcasts

Episode 341 Deep Dive: Anshuman Sharma | A Critical Infrastructure Approach to Cyber Security
byKBI.Media

Anshuman Sharma is the Director of Verizon Threat Research Advisory Centre (VTRAC), Cybersecurity Consulting Services at Verizon Business. Anshuman has more than 17 years’ experience as a well-rounded and seasoned Cyber Security Professional.

VTRAC is a specialized division within Verizon’s Cyber Security Consulting organisation, helping customers regain control and mitigate cyber threats from their networks, applications and devices. VTRAC team members are located across the globe, bringing together professionals with military, law enforcement and IT expertise who are well-versed in criminal and civil investigative requirements.  The organisation is a globally-approved PCI Forensic Investigator (PFI).

As a regional leader for the investigative response team and a global capability lead for VTRAC, Anshuman is responsible for business portfolio management for professional services, especially focused on digital forensics, incident response, and threat intelligence in the APJ region while working for several top global enterprises and government organisations.

No results found.
The Guardians that Safeguard our Critical Infrastructure

The Guardians that Safeguard our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s security lockdown failing during an active threat drill or a state government's emergency response network collapsing during a natural disaster. These scenarios are daily hypotheticals faced by the ...
No results found.

Business News ↓

Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience

Artificial Intelligence (AI): Driving Innovation, But At What Cost? AI is fundamentally transforming almost every business, not just by automating tasks, but by changing how decisions are made, how value is created, and how companies compete. It appears that there is virtually no limit to the transformative benefits AI will bring, including its ability to drive innovation. Previously, broad technology changes were...

The Identity Crisis CISOs Can No Longer Ignore

As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it truly is: the foundation of modern cybersecurity and a strategic...

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration significantly advanced the investigation. It alerted us to a detected...

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law. A Defining Test Case The Office of the Australian Information Commissioner’s lawsuit against Optus for its 2022 mega-breach, which exposed the data of...

How to Select the Optimum Physical Security Solution for Your Business

Choosing fit-for-purpose infrastructure that will keep your employees, assets and information safe is vital. Introduction Is a security uplift on your agenda during the next 12 months? For many Australian organisations, the answer is yes. While in 2025, our country remains a safe place. A nation where violent incidents, disorder and civil unrest are uncommon occurrences, businesses and organisations nonetheless...

How Ransomware Economics Drives the Global Cybercrime Industry

Introduction Cybercrime has matured into a highly structured global economy, rivalling legitimate industries in sophistication and profitability. The World Economic Forum projects that cybercrime will cost the global economy $10.5 trillion in 2025, effectively making it one of the largest economies in the world. (1) Ransomware is a key growth driver which has transformed from opportunistic disruption into a...

AI Governance in the Age of Relentless Adoption

AI is no longer a future concept. It is already reshaping how we work, how decisions are made, and how organisations operate. The pace of adoption is relentless. In many organisations, AI is embedded into workflows even when no formal policy or governance exists. This gap between adoption and oversight is one of the most pressing issues in technology leadership. Without governance, AI may deliver short-term...

Why Australia’s AI Ambitions Depend on Smarter Networks

Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of Australia’s electricity supply today, and according to reports could consume as much as 8% by 2030, or even escalate towards 15% under high-growth scenarios....

Decrypting the Future: Why Post-Quantum Security Must Start Today

Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like medical research, logistics and AI, it also has the potential to break the cryptographic systems that currently protect government, business and...

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges continue to grow in tandem with the expansion of attack surfaces....

How Drawing On The Power Of AI Technology Can Help Your Institution Stay A Step Ahead Of Scammers And Fraudsters In 2026

Embedding fraud intelligence into the digital banking experience will enable you to protect your customers more effectively. Introduction Are you confident your institution is doing all that it can to stop bad actors separating customers from their hard-earned funds? There’s no doubt the Australian banking industry has made heartening progress on this front in recent times. Published in March 2025, the National...

Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come first. That shift from preventing every attack to assuming breach and...
Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots cover

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

​Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new technologies. George began with a note that cybersecurity careers rarely follow a straight line. For instance, his journey began with a spark of...

GenAI for Cybersecurity – Embrace the Power, Own the Risk

Introduction Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, voice, and video at scale, increasing impersonation scams and malware campaigns.  In response to these evolving threats, security teams have also adopted GenAI tools to automate and streamline their cyberdefences. This dichotomous use of AI is...

Improving Australia’s Resilience Against Growing Cyber Threats

Introduction Australia’s cybersecurity landscape is evolving at a pace that few businesses and public-sector organisations can comfortably manage. It’s a situation marked by three interconnected challenges: a rapidly expanding attack surface, the weaponisation of artificial intelligence (AI), and systemic vulnerabilities in supply chains. These challenges are made more acute by the explosion of internet-connected...

Navigating Hybrid Cloud Security In the AI Era As Regulations Tighten

Introduction As hybrid cloud infrastructures continue to evolve, they are increasingly subject to AI-driven risks, complex data environments, and growing cyberthreats. Our recent 2025 Hybrid Cloud Security Survey underscores the rising pressure faced by organisations worldwide as AI technologies disrupt traditional security frameworks. With a 17 percent year-on-year rise in breach rates across Australia, these...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience

Artificial Intelligence (AI): Driving Innovation, But At What Cost? AI is fundamentally transforming almost every business, not just by automating tasks, but by changing how decisions are made, how value is created, and how companies compete. It appears that there is virtually no limit to the transformative benefits AI will bring, including its ability to drive innovation. Previously, broad technology changes were...

The Identity Crisis CISOs Can No Longer Ignore

As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it truly is: the foundation of modern cybersecurity and a strategic...

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration significantly advanced the investigation. It alerted us to a detected...

How to Select the Optimum Physical Security Solution for Your Business

Choosing fit-for-purpose infrastructure that will keep your employees, assets and information safe is vital. Introduction Is a security uplift on your agenda during the next 12 months? For many Australian organisations, the answer is yes. While in 2025, our country remains a safe place. A nation where violent incidents, disorder and civil unrest are uncommon occurrences, businesses and organisations nonetheless...
No results found.
No results found.
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.