The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting – meaning ...
How Organisations Can Combat the Surge in Phishing Attacks

How Organisations Can Combat the Surge in Phishing Attacks

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...
Why Human-Based and Identity Security is Becoming Increasingly Important

Why Human-Based and Identity Security is Becoming Increasingly Important

By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.

In The News

Patch Tuesday Comment: Tenable

Patch Tuesday Comment: Tenable

Microsoft addressed 49 CVEs in its June 2024 Patch Tuesday release with one rated as critical and no zero-day or publicly disclosed vulnerabilities. Tenable’s counts omitted two CVEs that were not issued by Microsoft, which include CVE-2023-50868 (issued by MITRE) and CVE-2024-29187 (issued by GitHub). Please find below commentary from Satnam ...
SentinelOne® Transforms Cloud Security for AWS Customers

SentinelOne® Transforms Cloud Security for AWS Customers

New products deliver AI-driven protection for serverless resources running in AWS Fargate
OpenText Cybersecurity MSP/MSSP Survey Finds Customers Seek AI-led Comprehensive Security Expertise for Threat Detection and Vulnerability Management

OpenText Cybersecurity MSP/MSSP Survey Finds Customers Seek AI-led Comprehensive Security Expertise for Threat Detection and Vulnerability Management

OpenText Cybersecurity 2024 Global Managed Security Survey reveals enterprises and SMBs Need Holistic and Composable Security
Pax8 Launches New Security Program

Pax8 Launches New Security Program

Providing partners with a comprehensive enablement journey to security growth
The Riskiest Connected Devices in 2024

The Riskiest Connected Devices in 2024

More than ever this year, attackers are crossing siloes to find entry points across the full spectrum of devices, operating systems, and embedded firmware forming the basis for the report, The Riskiest Connected Devices in 2024. Forescout, a global cybersecurity leader, delivers this fourth annual review of data sourced from nearly 19 million devices ...
Tenable Poll Shows 79% of Australian IT and Cybersecurity Leaders Want More Federal Funding for Preventive Cybersecurity Measures

Tenable Poll Shows 79% of Australian IT and Cybersecurity Leaders Want More Federal Funding for Preventive Cybersecurity Measures

Strong correlation between proactive risk management and up to 15% reduction in cyber insurance premiums
CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security

CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security

CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security. CrowdStrike’s Falcon platform delivers a complete CNAPP with unified visibility and threat protection across the entire cloud estate to help global customers stop cloud breaches.
Check Point Software Unveils Research Revealing How Organisations Are Harnessing GenAI To Improve Cyber Security

Check Point Software Unveils Research Revealing How Organisations Are Harnessing GenAI To Improve Cyber Security

Report shows the already widespread use of GenAI by security teams and how it is improving their efficiency and helping to bridge the skills gap

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This