The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery

Boosting Confidence In Ransomware Recovery

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star

Video Killed the Security Star

Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
Compliance and Security: The AI-Powered Identity Revolution

Compliance and Security: The AI-Powered Identity Revolution

The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities. The challenge is most organisations haven’t yet implemented a comprehensive identity security strategy to help manage the access for hundreds to thousands of identities, with ...

In The News

Elastic Announces First-of-its-kind Search AI Lake to Scale Low Latency Search

Elastic Announces First-of-its-kind Search AI Lake to Scale Low Latency Search

The pioneering architecture powers a new Elastic Cloud Serverless offering for rapid search, observability, and security workloads
VAST Data and Superna Boost Cyber Resilience with Intelligent Cyber Threat Protection and Instant Recovery for the AI Era

VAST Data and Superna Boost Cyber Resilience with Intelligent Cyber Threat Protection and Instant Recovery for the AI Era

AI data platform VAST Data today announced a partnership with Superna, a global leader in data security and cyberstorage solutions for on-premises, hybrid, and multi-cloud environments. The integration provides VAST customers with immutable data protection, real-time suspicious behaviour detection, automated cyber threat response, and near-instant ...
Hitachi Vantara and Veeam Form Global Strategic Alliance to Deliver Comprehensive Data Protection Solutions for Hybrid Cloud

Hitachi Vantara and Veeam Form Global Strategic Alliance to Deliver Comprehensive Data Protection Solutions for Hybrid Cloud

New partnership reinforces Hitachi Vantara defence-in-depth strategic approach, combining company's infrastructure expertise with Veeam's data protection and ransomware recovery software
Lenovo Advances Focus On Customer Security With New AI-Powered Cyber Resiliency As A Service

Lenovo Advances Focus On Customer Security With New AI-Powered Cyber Resiliency As A Service

Lenovo leverages its hardware leadership and Microsoft security solutions to help ensure business continuity and strengthened protections for customers Cyber protection, detection, response, and recovery integrates with greater visibility across the digital landscape for Lenovo Cyber Resiliency as a Service
LogRhythm and Exabeam Announce Intent to Merge, Harnessing Collective Innovation Strengths to Lead the Future of AI-Driven Security Operations

LogRhythm and Exabeam Announce Intent to Merge, Harnessing Collective Innovation Strengths to Lead the Future of AI-Driven Security Operations

The combined company will bring together two cybersecurity SIEM and UEBA innovation leaders with renowned and demonstrated track records in serving customers with effective threat detection, investigation, and response (TDIR)
AI Trust Gap Emerges: Australia Businesses Embrace Generative AI, But the General Public Remains Wary

AI Trust Gap Emerges: Australia Businesses Embrace Generative AI, But the General Public Remains Wary

New research from Alteryx uncovers 72% of businesses say Generative AI adds value, but 39% of the general public are fearful about its future
Motorola Solutions Showcases New Safety and Security Innovations at CCW

Motorola Solutions Showcases New Safety and Security Innovations at CCW

Motorola Solutions today unveiled new innovations across its safety and security ecosystem designed to help public safety agencies and enterprises communicate, collaborate and operate more efficiently and effectively. The highlights on display at Critical Communications World 2024 (CCW) include the new DIMETRA™ Connect solution and MXP660 TETRA radio ...
Trustwave SpiderLabs Exposes Unique Cybersecurity Threats In Public Sector

Trustwave SpiderLabs Exposes Unique Cybersecurity Threats In Public Sector

May 15 2024  – Trustwave, a leading cybersecurity and managed security services provider, has released a comprehensive report titled "2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies." The research dives deep into the distinct cybersecurity challenges facing the public sector and offers actionable ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This