The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Three Force Multipliers To Boost Cybersecurity Protections For Governments

Three Force Multipliers To Boost Cybersecurity Protections For Governments

Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as โ€˜force multipliersโ€™ for improving their protective coverage against cybersecurity threats.
Combating AI-Driven Attacks with Predictive Breach Technology

Combating AI-Driven Attacks with Predictive Breach Technology

Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live. One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...
Small Businesses Can Pull Their SOCs Up

Small Businesses Can Pull Their SOCs Up

Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy on-premises security solutions have given way to the cloud solutions offering greater scalability for enterprises.
Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams

The mythical cybersecurity unicorn โ€“ someone that can manage the minutiae of data coming in from logs, understand business risks in detail, communicate them to your board and run your security education and awareness program โ€“ does not exist.ย ย 
Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry

Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry

As people put off upgrading their still-functional Android phones, an ever-growing proportion are becoming outdated, and threat actors are cashing in.
Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.
The Future of VPNs? No Where.

The Future of VPNs? No Where.

Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on โ€˜Zero Trustโ€™. Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...
Predicting The Future – With Kavitha Mariappan

Predicting The Future – With Kavitha Mariappan

What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...

In The News

AI Month – Industry Leaders Discuss Opportunities and Challenges

AI Month – Industry Leaders Discuss Opportunities and Challenges

For Australia's inaugural AI Month, industry leaders are sharing their insights on the transformative potential of AI across sectors. Highlighting both opportunities and challenges, these leaders advocate for collaboration and proactive strategies to harness AIโ€™s capabilities while ensuring trust and accountability. Here are their perspectives on ...
Finnish Customs Closed Down the Sipulitie Marketplace on the Encrypted TOR Network

Finnish Customs Closed Down the Sipulitie Marketplace on the Encrypted TOR Network

Together with the Swedish Police and private sector including Bitdefender, Finnish Customs has closed down and seized the contents of network servers of the Sipulitie marketplace that was operating on the Tor network from 2023. The site was used for criminal activities, such as for the anonymous sale of narcotics. The online narcotics marketplace ...
Secure Code Warrior Research: Critical Infrastructure Industries Making Progress on Secure-by-Design Developer Readiness

Secure Code Warrior Research: Critical Infrastructure Industries Making Progress on Secure-by-Design Developer Readiness

New analysis collaborated on with Paladin Global Institute highlights the critical need for developer upskilling to properly measure Secure-by-Design progress
SBS Transit and Motorola Solutions Ink Long Term Contract For More Resilient Railway Communications

SBS Transit and Motorola Solutions Ink Long Term Contract For More Resilient Railway Communications

Singaporeโ€™s leading public transport operator SBS Transit has signed a SGD $14 million long term service support (LTSS) contract with Motorola Solutionsย to maintain and support critical radio communications across SBS Transitโ€™s Downtown Line and Sengkang and Punggol Light Rapid Transit system for the next 15 years. TETRA radio communications are ...
New Ransomware Attacks On Australian Businesses Sparks Urgent Calls For Boards To Prioritise Cyber Maturity

New Ransomware Attacks On Australian Businesses Sparks Urgent Calls For Boards To Prioritise Cyber Maturity

16th October 2024 - Australia. Global AI cyber defence leader Darktrace is sounding the alarm for Australian corporate boards to urgently prioritise cyber maturity, following a rash of significant ransomware attacks on Australian companies. The cybersecurity threat to Australian businesses has intensified with the emergence of a new ransomware ...
Tenable Tackles Emerging Cloud and AI Risks With the Launch of Data and AI Security Posture Management for Cloud Environments

Tenable Tackles Emerging Cloud and AI Risks With the Launch of Data and AI Security Posture Management for Cloud Environments

Tenableยฎ, the exposure management company,ย today announcedย new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities forย Tenable Cloud Security, the actionable cloud security solution. By extending exposure management capabilities to cloud data and AI resources, Tenable Cloud Security ...
New WatchGuard Threat Lab Report Finds Threat Actors Attempting to Turn Blockchains into Hosts of Malicious Content

New WatchGuard Threat Lab Report Finds Threat Actors Attempting to Turn Blockchains into Hosts of Malicious Content

Other key findings include surge of info-stealers and botnets, an increase in evasive malware and a rise in network attacks across the Asia Pacific
Australia Neglects Software Supply Chain Amid Calmer Security Climate, SUSE Report Finds

Australia Neglects Software Supply Chain Amid Calmer Security Climate, SUSE Report Finds

Australiaโ€™s cloud security lags as organisations fail to prioritise the software supply chain

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This