The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by ‘Zombie’ APIs

The Security Threat Posed by ‘Zombie’ APIs

Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs). The challenge of ‘zombie APIs’ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australia’s finance sector needs

PAM may be the infosec pressure relief valve Australia’s finance sector needs

Information security is a journey, but calls of, ‘Are we there yet?’ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.

In The News

Logicalis’ Latest Release Of AI-Powered Digital Fabric Platform Delivers Enhanced Visibility For CIOs

Logicalis’ Latest Release Of AI-Powered Digital Fabric Platform Delivers Enhanced Visibility For CIOs

Logicalis’ Digital Fabric Platform features new capabilities to drive business outcomes and improve enterprise-wide visibility, efficiency, and effectiveness. The award-winning platform now includes a streamlined user interface with richer insights, an overall infrastructure health score, and artificial intelligence (AI) powered recommendations in ...
Ping Identity Survey Finds Australians Don’t Trust Banks To Keep Their Personal Data Secure

Ping Identity Survey Finds Australians Don’t Trust Banks To Keep Their Personal Data Secure

Sydney, 16 January 2024 - Ping Identity, a leading provider of seamless and secure digital experiences, released its annual survey which evaluates Australian consumer sentiment around engaging with brands and businesses online. The report surveyed 1600 adult Australians and identified rising concern about the risk of identity theft. It’s now the ...
LogRhythm Product Innovation Prioritises Speed and Efficiency for Fast, Agile and High-Performing Security Teams

LogRhythm Product Innovation Prioritises Speed and Efficiency for Fast, Agile and High-Performing Security Teams

Sydney, 16 January 2024 - LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its seventh consecutive quarterly release. This announcement comes on the heels of over 200 new features released throughout 2023 across the company’s self-hosted and cloud-native SaaS ...
AIIA Supports Government’s Risk Based Framework To AI Regulation:

AIIA Supports Government’s Risk Based Framework To AI Regulation:

AIIA Supports Government’s Risk Based Framework To AI Regulation: Regulation Needs To Safeguard Australians While Supporting AI Growth And Adoption. The AIIA welcomes the Albanese Government’s release of its response to the AI discussion paper and consultations that outlines its approach to developing a regulatory framework for the use of Artificial ...
Latest FedRAMP® Authorisation Increases Trend Micro’s Leadership as the Most Globally Compliant Cybersecurity Platform

Latest FedRAMP® Authorisation Increases Trend Micro’s Leadership as the Most Globally Compliant Cybersecurity Platform

Enterprises and governments worldwide rely on Trend to bridge the gap between security and compliance
Vulnerabilities identified in Bosch BCC100 Thermostat

Vulnerabilities identified in Bosch BCC100 Thermostat

Several factors underscore the importance of smart thermostats: energy efficiency, environmental sustainability, and the spread of smart home technologies. These devices have a major impact on energy conservation and its associated cost savings, while making homes noticeably more comfortable. This combination of energy efficiency, convenience and ...
Forescout is a Proud Participant in the Microsoft Security Copilot Partner Private Preview

Forescout is a Proud Participant in the Microsoft Security Copilot Partner Private Preview

SYDNEY, Australia, January 10, 2024 – Forescout, a global cybersecurity leader, today announced its participation in the Microsoft Security Copilot Partner Private Preview. Forescout was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close ...
New Cloudflare Report Shows Organisations Struggle to Identify and Manage Cybersecurity Risks of APIs

New Cloudflare Report Shows Organisations Struggle to Identify and Manage Cybersecurity Risks of APIs

Insights reveal that while APIs account for the majority of Internet traffic, they remain largely unsecured

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governements, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This