KBI.Media

Editor’s Picks

We are inundated with hundreds – often thousands – of articles each week. It’s our job to sift through them and find the most relevant and most prescient to keep our audience informed.

Once in a while, an articles stands out as worth paying particular attention to, and these are our Editor’s Picks.

 

Newest Pick

CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a response back to the source IP address, it is sent to the fake source IP address ...

From The Archives 

Why Human-Based and Identity Security is Becoming Increasingly Important

Why Human-Based and Identity Security is Becoming Increasingly Important

By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.
Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

Global Investment Group BOKA Fuels Growth of Deep Tech Companies to Bolster National Security

BOKA, a global investment group, with headquarters in London is revolutionising the deep tech sector by identifying, funding, and enabling companies that can address critical National Security mission needs for the AUKUS Alliance which include the United States, the United Kingdom, and Australia - as well as other close allies around the world. At ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For ...
Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

WASHINGTON, D.C. – 23 October 2023 – Today Microsoft announced major digital infrastructure, skilling and cybersecurity investments in Australia to help the nation seize the artificial intelligence (AI) era to strengthen its economic competitiveness, create high-value jobs and protect the nation from the increasing threat of cyberattacks. Microsoft ...
Espionage Fuels Global Cyberattacks

Espionage Fuels Global Cyberattacks

In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This