The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Pythonโ€™s, PyPIโ€™s and Python Software Foundationโ€™s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentinaโ€™s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them allโ€”with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australiaโ€™s Physical Security Environments

How Privacy-By-Design Is Influencing Australiaโ€™s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, itโ€™s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…

Technology Company Names Have More Meaning than We Expected…

Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI

Exploring Opportunities, Fears, and the Future with AI

Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
Why Robust Disaster Recovery Is a USP for MSPs

Why Robust Disaster Recovery Is a USP for MSPs

As Australiaโ€™s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...
Why CISOs Need a Voice In the Boardroom

Why CISOs Need a Voice In the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. ...
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.

In The News

Kyndryl Readiness Report: 87% Confident in IT, but 38% Say It’s Future-Ready

Kyndryl Readiness Report: 87% Confident in IT, but 38% Say It’s Future-Ready

Inaugural global study, with exclusive data from AI-powered Kyndryl Bridge, shows how executives, including Australian business leaders, rank risks, prioritise investments, and balance technology and talent
Gathid Software Strengthens Security Posture With ISO 27001:2022 Certification

Gathid Software Strengthens Security Posture With ISO 27001:2022 Certification

The global certification reinforces Gathidโ€™s commitment to data integrity and privacy, and highlights its leadership in the identity and access governance market
Recorded Future and Singaporeโ€™s Cyber Security Agency Sign Memorandum of Collaboration At Singapore International Cyber Week 2024

Recorded Future and Singaporeโ€™s Cyber Security Agency Sign Memorandum of Collaboration At Singapore International Cyber Week 2024

Landmark Agreement Establishes New Framework to Augment Singaporeโ€™s Cybersecurity Efforts
CrowdStrike Appoints Proven Leader Louis Tague To Accelerate Growth, Drive Cybersecurity Transformation In Australia And New Zealand

CrowdStrike Appoints Proven Leader Louis Tague To Accelerate Growth, Drive Cybersecurity Transformation In Australia And New Zealand

Tague brings nearly three decades of cybersecurity and IT leadership experience to new role as VP of sales for ANZ; will drive growth and accelerate adoption of AI-native Falcon platform to meet regional cybersecurity requirements
ExtraHopยฎ Accelerates Threat Hunting with New Capabilities to Counter Escalating Ransomware Threat

ExtraHopยฎ Accelerates Threat Hunting with New Capabilities to Counter Escalating Ransomware Threat

Empowers enterprises to detect, investigate, and respond to malicious files with more speed and precision Seattle, 16 October 2024ย โ€“ย ExtraHopยฎ, a leader in cloud-native network detection and response (NDR), today unveiled new network-based file analysis capabilities in ExtraHop RevealXโ„ข to detect malware, combat ransomware, and help prevent data ...
CrowdStrike Supports U.S. DOJโ€™s Anonymous Sudan Indictment And Reveals Motivations Behind DDoS Attacks

CrowdStrike Supports U.S. DOJโ€™s Anonymous Sudan Indictment And Reveals Motivations Behind DDoS Attacks

Outside of its high-profile technology sector targets, Anonymous Sudan frequently targeted entities in the telecommunications, healthcare, academic, aviation, government, media and financial sectors โ€” often including critical infrastructure such as hospitals, airports, banks and telecommunications providers. The group's geographic targeting scope was ...
Arctic Wolf 2024 Human Risk Behaviour Report Reveals Over Two-Thirds Of Australian And New Zealand-Based Security And IT Leaders Have Fallen For Phishing Attacks

Arctic Wolf 2024 Human Risk Behaviour Report Reveals Over Two-Thirds Of Australian And New Zealand-Based Security And IT Leaders Have Fallen For Phishing Attacks

Poor password hygiene runs rampant with 67% of IT leaders and end users admitting to reusing system passwords
Fortinet FortiGuard Labs Observes Darknet Activity Targeting the 2024 United States Presidential Election

Fortinet FortiGuard Labs Observes Darknet Activity Targeting the 2024 United States Presidential Election

Phishing scams aimed at voters, malicious domain registrations impersonating candidates, and other threat activity designed to exploit unassuming victims take centre stage as the U.S. election approachesย 

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This