The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Why โSecure by Designโ Is Critical In Todayโs Interconnected World
Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturityโand individual developer security skillsโwill be paramount in facilitating the right growth and knowledge building.
Ransom Data Should Be Made Public
The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity
Good AI and Cybersecurity Relies On Resilient Data
General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)
Introduction
Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, itโs a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare
Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems
Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or โadwareโ, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
In The News
OpSys Australia Appoints Shanna Daly as Inaugural Chief Information Security Officer
Cyber Security Expert to Lead and Align the Companyโs Cyber Security Strategy with Regional Customer Needs
Sophos Appoints Torjus Gylstorff as Sophosโ Chief Revenue Officer
Sophos today announced that Torjus Gylstorff has joined the company as Chief Revenue Officer (CRO).
Gylstorff is responsible for driving revenue growth through effective leadership of Sophosโ global sales organisation and partner and customer networks. This includes expanding Sophosโ presence beyond its already strong customer base of more than ...
Informatica Delivers Blueprints to Simplify and Accelerate Generative AI Development on Leading Technology Platforms
Informatica (NYSE: INFA), a leader in enterprise AI-powered cloud data management, has announced the availability of Generative AI (GenAI) Blueprints that make it faster and easier for customers to build enterprise-grade GenAI applications on six industry-leading technology platforms.
The blueprints โ for AWS, Databricks, Google Cloud, Microsoft ...
F5 to Supercharge AI Application Delivery for Service Providers and Enterprises with NVIDIA BlueField-3 DPUs
F5 BIG-IP Next for Kubernetes, F5โs new intelligent proxy, combined with NVIDIA BlueField-3 DPUs, transforms application delivery for AI workloads
Alkira Launches Zero Trust Network Access (ZTNA) Solution To Simplify End-To-End Secure Connectivity For Enterprises
Leaders in Network Infrastructure as a Service, Alkira, has launched 'Alkira Zero Trust Network Access' (ZTNA), a groundbreaking cloud-based service that redefines secure access from anywhere for the modern enterprise. Alkira ZTNA combines zero trust principles with Alkira's renowned network infrastructure expertise to deliver a unified platform for ...
Fortinet Report Finds Nearly 70 Percent Of Organisations Say Their Employees Lack Fundamental Security Awareness
New research highlights the connection between increased organisation-wide cyber awareness and decreased organisational riskย
Thoughtworks Technology Radar Finds Trend In Tools To Simplify LLMs For Practical AI Applications
Thoughtworksย (NASDAQ: TWKS), a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today released volume 31 of theย Technology Radar, a biannual report informed by Thoughtworksโ observations, conversations and frontline experiences solving its clientsโ most complex business challenges.
CrowdStrike And Omnissa Partner To Secure Virtual And Physical Desktops
AUSTIN, Texas โ October 23, 2024 โย CrowdStrikeย (NASDAQ: CRWD) andย Omnissa, a leading digital work platform company, today announced a collaboration to deliver real-time threat detection and automated remediation for Virtual Desktop Infrastructure (VDI) and physical desktop environments while improving customersโ digital work experience and ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..