The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Why Microsegmentation is the Key to Containing Breaches in Todayโs Cybersecurity Landscape
Discover why microsegmentation is vital for breach readiness. Learn how it prevents lateral movement, protects sensitive data, and ensures business continuity amidst evolving cyber threats.
Navigating Cybersecurity Decision-making In The Age Of AI: Insights Into Operational, Tactical, And Strategic Influences
The factors that impact all decisions in cybersecurity mainly stem from four sources: industry, organisation, team, and individual.ย
Why Breaking Down Identity Silos Has Become An Imperative For Business
In an increasingly complex IT environment, a unified IAM solution is essential for reducing security vulnerabilities and optimising resource allocation. A comprehensive IAM platform centralises identity management across on-premises, cloud, and hybrid environments, creating a secure and agile organisation.
The Revitalised Cisco – with AI Prowess
Technology giant, Cisco seems to be defying the trend by not only adapting AI but leading the charge in several strategic areas. Tom Gillis, Senior Vice President and General Manager, Security Business Group at Cisco, recently presented on main stage at Cisco Live in Melbourne about the transformative journey and the new vision driving the company ...
Post-Quantum Cryptography And Compliance: Where Are We Now?
As quantum computing technology advances, traditional cryptographic protocols are at risk, prompting regulatory bodies to urge the adoption of quantum-safe measures. This article explores how Post-Quantum Cryptography (PQC) plays a vital role in securing sensitive data and ensuring compliance across industries. Highlighting standards from organisations ...
Cybersecurity Shortfalls Threaten Australia’s Push to Boost Tech Exports
Australia aims to boost economic growth by expanding its technology exports, but inadequate cybersecurity infrastructure is hindering these ambitions. To compete globally, Australian tech companies need stronger support to address cybersecurity and productivity challenges similar to those tackled by the United States and Europe.
Chief Executive, Erik Prusch Shares Vision to Steer ISACA into the Future
Recently, I headed down to Melbourne to attend the ISACA, Beyond Tomorrow event. Erik Prusch, CEO of ISACA flew from the United States to maintain his philosophy of being on the ground amongst members. Having joined ISACA just over a year ago, Prusch brings a fresh perspective to an organisation that commands a global footprint with 180,000 members ...
N-Powered Change – What Can We Learn from NetApp INSIGHT 2024
NetApp INSIGHT 2024, held in Las Vegas in September, served as a pivotal event for data management and cloud innovation professionals worldwide, particularly those focused on driving efficiency and harnessing the power of Artificial Intelligence (AI) within enterprise systems, and in the development of cyber resilience.
The conference highlighted ...
In The News
Rapid7 Expands Exposure Command With Support For AWS Resource Control Policies
Rapid7's Exposure Command solution now supports Amazon Web Services (AWS) Resource Control Policies (RCPs). As a launch partner for this powerful feature, Rapid7 now provides additional visibility, insights, and best practices that guide customers in addressing complex enterprise Identity and Access Management (IAM) challenges across the modern attack ...
Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection
New integration combines Exabeam AI-powered analytics with Wiz's comprehensive cloud security insights to boost threat detection, investigation, and response capabilitiesย
Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub
Immediate access to the powerful, highly scalable AI/ML functions of ClearScape Analytics, in a serverless, on-demand compute engine that integrates natively with Fabric and OneLake
Tenable Comment on Annual Cyber Threat Report 2023-2024
The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or credentials. Please find further comments below from Satnam Narang, sr. staff research engineer, Tenable.
โThe Annual Cyber Threat Report from the ASDโs ACSC provides insights into ...
Yubico Announces Yubico Enrollment Suite for Microsoft users, a Turnkey Passwordless Onboarding Experience
November 20, 2024 โ Todayย Yubicoย (NASDAQ: YUBICO), the leading provider of hardware authentication security keys, announced the availability ofย Yubico Enrollment Suiteย for Microsoft users, includingย Yubico FIDO Pre-regย and the newย YubiEnroll. These solutions integrate with Microsoftโs Entra ID, helping organisations create stronger cyber resilience and ...
Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected
Organisations are reassessing their cybersecurity budget allocations after taking 5.9 months to recover from incidents in 2024 - over a month longer than expected
Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available
As the digital landscape grows increasingly interconnected, defenders face a critical challenge: the data and insights from various security tools are often siloed or, at best, loosely integrated. This fragmented approach makes it difficult to gain a holistic view of threats or assess their potential impact on critical assets. In a world where a single ...
Thales Expands CipherTrust Data Security Platform as-a-Service Offerings
CipherTrust Transparent Encryption helps organisations meet compliance mandates and protect data wherever it resides New Cloud Service includes Live Data Transformation for non-disruptive encryption and Ransomware Protection to monitor continuously for abnormal activity
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..