Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

WASHINGTON, D.C. – 23 October 2023 – Today Microsoft announced major digital infrastructure, skilling and cybersecurity investments in Australia to help the nation seize the artificial intelligence (AI) era to strengthen its economic competitiveness, create high-value jobs and protect the nation from the increasing threat of cyberattacks. Microsoft will invest A$5 billion in expanding its hyperscale cloud computing and AI infrastructure in Australia over the next two years – the single largest investment in its forty- year history in the ...

Podcasts

Episode 255 Deep Dive: Jason Baden | Simplifying API Security: The Impact and Evolution of Secure Application Development
byKBI.Media

Jason has almost 20 years’ experience as a senior executive in the IT and telecommunications industry. Prior to joining F5, he was Country Manager at Ruckus Networks and was responsible for leading the ANZ team strategy, as well as the smooth integration of ARRIS following its acquisition of Ruckus Networks. He has also previously held roles at Juniper Networks, AXS-One, Airwide Solutions, and Optus.

Business News ↓

Navigating the Australian Cybersecurity Market cover

Navigating the Australian Cybersecurity Market

In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the cybersecurity landscape.Collaborative Nature of the Australian...

Where Australian Organisations Go Wrong With Cyber Risk Quantification

In an age where boards and directors are more interested in cybersecurity than ever before - rated by Australian directors as the top-ranking issue keeping them ‘awake at night’ - the best way for CISOs and cybersecurity teams to communicate risk is in terms that the executive committee and directors will understand. As a security leader, that means understanding your audience and the way they prefer to take in...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...

The Conversations Boards Should Have About Cybersecurity

Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they need to be informed participants in cybersecurity discussions....

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...

The Glimpse at the Future of Software Academia

Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has its’ origins in simplistic terms - via code written on manual punch cards and then fed into...

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Hybrid and multi-cloud management serve as the bedrock of modern business operations, leading the charge in harnessing the full potential of cloud technologies. Yet, according to a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, the vast majority of Australian cybersecurity and IT leaders (68%) view cloud infrastructure as the greatest source of cyber risk in their organisation....

The Real “People Problem” In Cybersecurity Is Not What You Think It Is

The idea that cybersecurity is a people problem is so often repeated that it has become a truism for the sector. A casual search of “Cybersecurity people problem” returns 341 million results and, unsurprisingly, a wide range of answers to the question: ‘Which people are the problem?’ Bosses, cybersecurity teams, users, employees, hackers: if a party exists to whom blame could be apportioned, it’s been done. But the...

CISOs in 2024: Embracing a Strategic Security Vision

In recent years, the role of the Chief Information Security Officer (CISO) has undergone a significant evolution. Once solely focused on technical components such as firewalls and network security, CISOs today are strategic leaders shaping cybersecurity across their entire organisation. This evolution reflects the ever-increasing complexity of the cyberthreat landscape, where sophisticated attacks target not just...

Five Steps For New Zealand Businesses To Effectively Manage Incident Response

With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will respond to a cybersecurity incident. In the last year, data breaches and other attacks have cost New Zealand around $20 million. The degree of incident...

Growing Sustainability Through Colocation Services

The Playing Field Over the past several years sustainability has become a growing priority for most, if not all, organisations. Forward-thinking businesses, consumers and governments alike are increasingly looking at how to increase their sustainability efforts, while many decisions are increasingly being made with enhancing sustainability as an important driver. One key trend is for businesses is moving to hybrid...

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there's also an increase in the number of available open-source software. However not all open-source components are created equally or maintained properly. As a result, we are seeing an increase in software supply chain...

Fish In a Barrel – Australia’s At-risk Cleared Personnel

Background on Security Clearances in Australia Security Clearance Levels Under the Australian Government Protective Security Policy Framework, individuals who need access to security classified  resources must hold a security clearance. This includes classified information, systems that hold classified information, and classified assets. An individual may also be required to hold a security clearance if they occupy...

AI Skills Could Boost Australia Workers’ Salaries By More Than 29% And Accelerate Career Growth As AI Adoption Ramps Up, Finds New Research

Amazon Web Services (AWS), an Amazon.com company, today released new research showing that when artificial intelligence (AI) is fully harnessed, Australian workers with AI skills and expertise could see salary hikes of over 29%, with workers in IT (37%), and business operations (35%) enjoying the highest pay bumps. To better understand emerging AI usage trends and skilling needs in Australian workplaces, AWS...

Protecting The Digital Realm Knows No Gender

Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more appealing to women, many of whom are making significant contributions to development. It’s more than conquering challenges; it’s about showcasing the...

Reputational Risk, Ransomware and the ‘Operational Resilience’ Imperative

An Overview Whether it’s on international headlines or in local Australian news, headlines of data related business outages, and associated credibility damage are on the rise. From the DP World hack that stranded tens of thousands of shipping containers, to increasingly audacious ransomware attacks on all levels of public and private organisations – data management has become a mainstream topic and highly...
Episode 130: Apurva Chiranewala

Episode 130: Apurva Chiranewala

Apurva Chiranewala is the General Manager of fintech company Block Earner, where he oversees global operations, growth and ...
Episode 149: Matt Johnston

Episode 149: Matt Johnston

Born in Sydney, Australia, and having lived in the United States for the past 12 years, Matt Johnston has had an ...

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Why Has Critical Infrastructure Become A Prime Target For Cyber Attacks?

From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly relying on an internet connection to help them deliver their services. Critical infrastructure are the physical and digital shared systems that help...

How Monitoring Can Enhance An Organisation’s Security Protection

In our modern world, where enterprises are increasingly reliant on technology, having the right network monitoring in place will help ensure an organisation’s IT infrastructure continues to function at optimum levels and that there are fewer issues with connected devices and services. It sounds simple but just like all IT systems, keeping infrastructure and devices secure from threats is equally important. Network...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

The Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability known as CVE-2022-38028 within the Windows Print Spooler service using a malware called GooseEgg. CVE-2022-38028 represents an elevation of privilege vulnerability which could enable attackers to install additional malware like a backdoor or they could use these elevated privileges to perform lateral...

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 years^. Increasingly AI is being used across numerous industries such as healthcare,...
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and ...