The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Security is Not a Zero-Sum Game

Security is Not a Zero-Sum Game

The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong and when they do - our whole world turns with it. Jeetu Patel, Executive Vice President & Chief Product Officer at Cisco, discussed his strong stance against monopolies in the tech industry and his view on collaboration and ...
The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity

The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity

The article talks to the importance and urgency of Real-Time Cyber Asset Risk Reporting in todayโ€™s threat landscape. It highlights Australian statistics, touching on increases in attack frequency, targeted industries, and the financial impact on Australian businesses, and how Australian business may be lagging behind in their defences, and touches on ...
Scams and The Critical Role for Australian Banks

Scams and The Critical Role for Australian Banks

Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission's report Australians lost AUD $2.74 billion to scams in 2023 - although this was a welcome decline compared to 2022 (AU$3.15 billion lost) it is still alarmingly ...
Sustainability in Business is More than a Reusable Coffee Cup

Sustainability in Business is More than a Reusable Coffee Cup

When people hear sustainability, some might straight away think - oh yes a reusable coffee cup. Perhaps, however in this context weโ€™re talking about sustainability within tech businesses and what does this mean and more importantly - what does that look like?Luke Hargreaves, Founder and CEO from Aquainnis chatted to me about the urgent need for ...
How To Quickly Kick Start Holistic SAP Security

How To Quickly Kick Start Holistic SAP Security

SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.
Exclusive: Zero Trust Security – The way Forward for IT and Security

Exclusive: Zero Trust Security – The way Forward for IT and Security

In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on todayโ€™s cyber market and predictions in regards to the future of cybersecurity. The crucial ...
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope

Deepfakes and the US Election | A Slippery Slope

The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...

In The News

Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source ...
AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

With sales beginning as early as October and extending through late December, Imperva warns that the holiday shopping season represents a critical time for online retailers. AI-driven attacks originate from AI tools like ChatGPT, Claude, and Gemini, alongside specialised bots that are designed to scrape websites for LLM (Large Language Model) training data.
Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave, a global leader in cybersecurity and managed security services, has announced an expanded partnership with Dicker Data, Australiaโ€™s premier IT distributor, which has long been a Trustwave solutions distributor. Dicker Data will now offer the entire portfolio of Trustwaveโ€™s cutting-edge cybersecurity services to its resellers as part of this ...
Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organisations Worldwide

Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organisations Worldwide

Sophos today announced a definitive agreement for Sophos to acquire Secureworks. The all-cash transaction is valued at approximately $859 million. Sophos is backed by Thoma Bravo, a leading software investment firm. Sophosโ€™ experience and reputation as a leading provider of managed security services and end-to-end security products, combined with ...
Camelot Secure Wins APT Solution Provider of the Year, Leading the Charge in Proactive Cybersecurity Defense

Camelot Secure Wins APT Solution Provider of the Year, Leading the Charge in Proactive Cybersecurity Defense

Camelotโ€™s Advanced Persistent Threat (APT) Hunt Service offers organizations a means to proactively identify potential threats through advanced technological innovations before they can inflict harm. This approach represents a significant departure from traditional cybersecurity practices, shifting towards a more offensive, proactive strategy in ...
BeyondTrust Releases Cybersecurity Predictions for 2025 and Beyond

BeyondTrust Releases Cybersecurity Predictions for 2025 and Beyond

BeyondTrust experts predict a paradigm shift in security strategies as identity risks and quantum threats take centre stage Top cybersecurity threats include the evolution of the AI2, quantum computing, and cyber insurance
SentinelOne Expands Strategic Collaboration With AWS To Deliver AI-Powered Cybersecurity

SentinelOne Expands Strategic Collaboration With AWS To Deliver AI-Powered Cybersecurity

SentinelOne capitalises on AWS AI infrastructure and Amazon Bedrock to solve customersโ€™ cloud security, endpoint security and AI-SIEM needs with Purple AI MOUNTAIN VIEW, CA AND LAS VEGAS, NV - October 17, 2024 - SentinelOne ย (NYSE: S) today announced an extension of its strategic collaboration agreement (SCA) with Amazon Web Services (AWS), designed ...
Progress AI-Powered Flowmon Introduces Up to 10x Search Acceleration for Faster Cyberthreat Hunting and Network Troubleshooting

Progress AI-Powered Flowmon Introduces Up to 10x Search Acceleration for Faster Cyberthreat Hunting and Network Troubleshooting

IP Address Indexing is the first in a series of major performance and scalability enhancements to the Flowmon AI-powered Network Detection and Response & Network Visibility offerings

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This