The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Cyber-insecurity – The Contact Centre Challenge (and Solution)
Introduction
Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, itโs a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare
Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems
Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or โadwareโ, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI
Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime
Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day
Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around โrethinking trustโ. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. Youโve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture
A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
In The News
CyberArk And Wiz Team Up To Provide Complete Visibility And Control For Cloud-Created Identities
Cloud-native organisations to gain full understanding over every identity in the cloud, secured with Zero Standing Privileges and at cloud velocity
CyberArkย (NASDAQ:ย CYBR), the global leader inย identity security, today announced a high-impact partnership with leading cloud security provider Wiz. The two companies are joining forces to enable customers ...
Veeam Enhances Veeam Data Cloud Vault with Predictable Cloud Storage Solution
Veeam Software announced major updates to Veeam Data Cloud Vault, a fully-managed, secure, and cloud-based storage service that leverages the power of Microsoft Azure and simplifies storing backups of mission critical data and applications offsite for unmatched business resilience. This new release, developed in collaboration with Microsoft, introduces ...
New SolarWinds Report: Automation, Self-Service, And SLAs Are Keys To ITSM Efficiency
Findings from the SolarWinds 2024 State of ITSM Report showcase several more effective methods for up-leveling ITSMย ย
SYDNEY, Australia โ November 13, 2024 โ SolarWinds (NYSE:SWI), a leading provider of simple, powerful, secure observability and IT management software, today released its 2024 State of ITSM Report, which provides practical, actionable ...
Trustwave And Cybereason Merge To Form Global MDR Powerhouse For Unparalleled Cybersecurity Value
Strategic consolidation offers expanded cybersecurity suite of market-leading MDR, EDR, offensive security, DFIR, and threat intelligenceย
November 13, 2024ย โ Trustwave, a cybersecurity and managed security services leader, and Cybereason, a leading Endpoint Detection and Response (EDR) company, have announced a definitive merger agreement offering a ...
Tenable November Patch Tuesday Commentary
This month, Microsoft patched four zero-day vulnerabilities, including two that were exploited in the wild. Remote code execution (RCE) vulnerabilities accounted for 58.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%. A full analysis by Tenable can be found in this blog and commentary from ...
Available Now: YubiKey Bio Series โ Multi-Protocol Edition Keys Expand Phishing-Resistant Authentication Options For Enterprises
As adoption of biometric logins continues to increase globally, enterprises and cybersecurity teams require stronger security combined with user convenience to improve user adoption of multi-factor authentication (MFA) and ensure productivity. Hardware security keys that leverage biometrics, like theย YubiKey Bio Series, enable organisations to do so by ...
Yubico To Submit YubiKey 5 FIPS Series for FIPS 140-3 Validation
Theย YubiKey 5 FIPS Seriesย latest 5.7.4 firmware has completed testing by ourย NIST accredited testing lab, and will be submitted to the Cryptographic Module Validation Program (CMVP) for FIPS 140-3 validation, Overall Level 2 and Physical Level 3. This marks a significant milestone in our ongoing commitment to providing high-assurance security solutions ...
Informatica Expands GenAI-Powered CLAIRE GPT in Europe and Asia Pacific Regions
Informaticaย (NYSE: INFA), a leader in enterprise AI-powered cloud data management, today announced the expansion of the industryโs first enterprise GenAI-powered data management assistant,ย CLAIREยฎ GPT, in Europe and Asia Pacific (APAC)
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..