The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI
Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime
Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day
Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around โrethinking trustโ. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. Youโve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture
A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation
There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?
Introduction
In todayโs increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...
Breaking Down Barriers to Cybersecurity Frameworks
Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Governmentโs Essential Eight, effectively.
ย
The complexity of deployment, the need for a cultural ...
In The News
CrowdStrike And Fortinet Deliver Industry-Leading Protection From Endpoint To Firewall
Austin, TX โ October 22, 2024 โย CrowdStrikeย (NASDAQ: CRWD) today announced a strategic partnership with Fortinet to unify best-in-class endpoint and firewall protection. By integrating AI-native endpoint security from theย CrowdStrike Falconยฎ cybersecurity platformย andย Fortinetโs FortiGateย next-generation firewalls (NGFW), customers and partners gain ...
NetApp and Childrenโs Cancer Institute Unite for CEO Dare to Cure to Fight Childhood Cancer
Sydney, Australia โ 24 October 2024 โ NetApp, the intelligent data infrastructure company, is proud to announce its partnership with Childrenโs Cancer Institute as the Presenting Partner of the CEO Dare to Cure Challenge, a major fundraising event supporting critical research into childhood cancer. As a trusted technology partner, NetApp provides the ...
Fastly Unveils New DDoS Protection Solution To Defend Against Disruptive Application DDoS Attacks
Sydney, 23 October, 2024 โ Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, today announced the general availability of Fastly DDoS Protection to provide automatic protection from Layer 7 and other application-level DDoS attacks. With a click of a button, organisations can enable Fastly DDoS Protection to automatically shield their ...
New OT Security Solutions From Palo Alto Networks Address Growing Cybersecurity Threats To Industrial Operations
Powered by Precision AI, new capabilities protect OT remote operations, mitigate risk for critical OT assets and extend security into harsh industrial environments
Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today introduced new capabilities in its OT Security solution, including the industryโs only fully integrated, risk-based ...
UiPath Unveils Vision for the Future: Expanding the Boundaries of AI with Agentic Automation
UiPath (NYSE: PATH), a leading enterprise automation and AI software company, today announced its new vision and strategic direction centred on the next evolution of enterprise automation โ agentic automation.
Launches New Machine Identity Security Product To Help Simplify Management, Security, And Lifecycle Of Machine Identities For Enterprises
SailPoint is expanding beyond human identity governance into the rapidly growing field of machine identities, addressing a critical gap for enterprises
Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks
Privileged Task Automation revolutionises the way organisations manage the execution of tasks that require privileged access
New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour
The findings demonstrate a strong correlation between full-stack observability and reduced downtime, fewer interruptions, and lower annual outage costsโreinforcing the critical role observability plays in maximising operational efficiencies and business performance.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..