The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Pythonโs, PyPIโs and Python Software Foundationโs GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub.
As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentinaโs shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them allโwith the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australiaโs Physical Security Environments
When designing a comprehensive data protection and privacy strategy, itโs best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…
Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI
Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
Why Robust Disaster Recovery Is a USP for MSPs
As Australiaโs technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...
Why CISOs Need a Voice In the Boardroom
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done.
However, this is just part (the start) of the journey to cyber maturity. ...
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction
Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.
In The News
Kyndryl Readiness Report: 87% Confident in IT, but 38% Say It’s Future-Ready
Inaugural global study, with exclusive data from AI-powered Kyndryl Bridge, shows how executives, including Australian business leaders, rank risks, prioritise investments, and balance technology and talent
Gathid Software Strengthens Security Posture With ISO 27001:2022 Certification
The global certification reinforces Gathidโs commitment to data integrity and privacy, and highlights its leadership in the identity and access governance market
Recorded Future and Singaporeโs Cyber Security Agency Sign Memorandum of Collaboration At Singapore International Cyber Week 2024
Landmark Agreement Establishes New Framework to Augment Singaporeโs Cybersecurity Efforts
CrowdStrike Appoints Proven Leader Louis Tague To Accelerate Growth, Drive Cybersecurity Transformation In Australia And New Zealand
Tague brings nearly three decades of cybersecurity and IT leadership experience to new role as VP of sales for ANZ; will drive growth and accelerate adoption of AI-native Falcon platform to meet regional cybersecurity requirements
ExtraHopยฎ Accelerates Threat Hunting with New Capabilities to Counter Escalating Ransomware Threat
Empowers enterprises to detect, investigate, and respond to malicious files with more speed and precision
Seattle, 16 October 2024ย โย ExtraHopยฎ, a leader in cloud-native network detection and response (NDR), today unveiled new network-based file analysis capabilities in ExtraHop RevealXโข to detect malware, combat ransomware, and help prevent data ...
CrowdStrike Supports U.S. DOJโs Anonymous Sudan Indictment And Reveals Motivations Behind DDoS Attacks
Outside of its high-profile technology sector targets, Anonymous Sudan frequently targeted entities in the telecommunications, healthcare, academic, aviation, government, media and financial sectors โ often including critical infrastructure such as hospitals, airports, banks and telecommunications providers. The group's geographic targeting scope was ...
Arctic Wolf 2024 Human Risk Behaviour Report Reveals Over Two-Thirds Of Australian And New Zealand-Based Security And IT Leaders Have Fallen For Phishing Attacks
Poor password hygiene runs rampant with 67% of IT leaders and end users admitting to reusing system passwords
Fortinet FortiGuard Labs Observes Darknet Activity Targeting the 2024 United States Presidential Election
Phishing scams aimed at voters, malicious domain registrations impersonating candidates, and other threat activity designed to exploit unassuming victims take centre stage as the U.S. election approachesย
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..