The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...

In The News

Patch Tuesday Comment: Tenable

Patch Tuesday Comment: Tenable

Microsoft addressed 49 CVEs in its June 2024 Patch Tuesday release with one rated as critical and no zero-day or publicly disclosed vulnerabilities. Tenable’s counts omitted two CVEs that were not issued by Microsoft, which include CVE-2023-50868 (issued by MITRE) and CVE-2024-29187 (issued by GitHub). Please find below commentary from Satnam ...
SentinelOne® Transforms Cloud Security for AWS Customers

SentinelOne® Transforms Cloud Security for AWS Customers

New products deliver AI-driven protection for serverless resources running in AWS Fargate
OpenText Cybersecurity MSP/MSSP Survey Finds Customers Seek AI-led Comprehensive Security Expertise for Threat Detection and Vulnerability Management

OpenText Cybersecurity MSP/MSSP Survey Finds Customers Seek AI-led Comprehensive Security Expertise for Threat Detection and Vulnerability Management

OpenText Cybersecurity 2024 Global Managed Security Survey reveals enterprises and SMBs Need Holistic and Composable Security
Pax8 Launches New Security Program

Pax8 Launches New Security Program

Providing partners with a comprehensive enablement journey to security growth
The Riskiest Connected Devices in 2024

The Riskiest Connected Devices in 2024

More than ever this year, attackers are crossing siloes to find entry points across the full spectrum of devices, operating systems, and embedded firmware forming the basis for the report, The Riskiest Connected Devices in 2024. Forescout, a global cybersecurity leader, delivers this fourth annual review of data sourced from nearly 19 million devices ...
Tenable Poll Shows 79% of Australian IT and Cybersecurity Leaders Want More Federal Funding for Preventive Cybersecurity Measures

Tenable Poll Shows 79% of Australian IT and Cybersecurity Leaders Want More Federal Funding for Preventive Cybersecurity Measures

Strong correlation between proactive risk management and up to 15% reduction in cyber insurance premiums
CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security

CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security

CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security. CrowdStrike’s Falcon platform delivers a complete CNAPP with unified visibility and threat protection across the entire cloud estate to help global customers stop cloud breaches.
Check Point Software Unveils Research Revealing How Organisations Are Harnessing GenAI To Improve Cyber Security

Check Point Software Unveils Research Revealing How Organisations Are Harnessing GenAI To Improve Cyber Security

Report shows the already widespread use of GenAI by security teams and how it is improving their efficiency and helping to bridge the skills gap

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This