The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How to Protect Against the Rising Tide of Password Spray Attacks
Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.
Australian Energy Sector Grappling with Rising Ransomware Threat
As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.
Eliminating Enterprise Risk: One Phishing-resistant User At a Time
Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
How to Innovate in a Privacy-Protective Way
Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.
Leading Cybersecurity Tech Trends Driving change
In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.
Layers of Defence Needed to Combat AI-powered Phishing Surge
AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud
From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach
The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
In The News
CIOs Sound Alarm on Network Security as a Top Priority as AI Fuels New Risks and Challenges
Survey of 200 CIOs and Senior IT professionals finds majority of respondents desire a single integrated platform for networking AI and security to improve productivity, streamline investments and ensure protection against evolving cyber threatsย
Thales Reports Significant Drop In Breaches Against FinServ Organisations; Poor Ransomware Response And GenAI Growing Concerns
Thales today released the findings of its 2024 Data Threat Report for Financial Services organisations, based on a subset of its global Data Threat Report survey which was released earlier this year. This Financial Services edition reveals a drop in data breaches against financial services organisations. However, ransomware response remains a challenge ...
Bitdefender Launches Scam Copilot, a Powerful Scam Defence Platform for its Digital Life Protection Solutions
Bitdefender today announced the launch of Scam Copilot, an advanced technology platform powered by artificial intelligence (AI) and designed to detect and fight scams along with fraud attempts across devices including computers, tablets and mobile phones. The platform has been integrated into several Bitdefender digital life protection consumer ...
OVHcloud Participates in 2024 OCP Global Summit Highlighting New Approach For Aluminium Heat Exchangers Cooling Solutions in Data Centres
OVHcloud, a global cloud player and the European Cloud leader, has taken part in the 2024 Open Compute Project (OCP) Global Summit opening in San Jose, California. Following the OCP EMEA Regional Summit 2024 this spring, where OVHcloud released two whitepapers for the broader community to use freely, the Group unveils a new workstream proposal aimed at ...
Forescout Achieves IRAP Certification
Forescout has today announced it has completed the Information Security Registered Assessors Program (IRAP) assessment at Protected level for its cloud security platform.
This milestone underscores Forescoutโs commitment to delivering industry-leading cybersecurity solutions that are designed to meet the highest standards of data protection and ...
OpenText Cybersecurityโs 2024 Ransomware Survey: Supply Chain Attacks Surge, Ransom Payments Persist
While companies improve defenses, almost half of respondents still suffer ransomware attacks and the resulting ransom payments only perpetuate the cycle of vulnerability
BeyondTrust Named a Leader Once Again in KuppingerCole Leadership Compass for Privileged Access Management
Report reaffirms BeyondTrustโs position as a Leader for the fifth consecutive year in the Privileged Access Management (PAM) market
Report highlights Innovation, Market Leadership, and Product Excellence
ColorTokens Appoints Former MD Anderson CTO Chuck Suitor As Strategic Advisor For Healthcare
SAN JOSE, Calif., October 10, 2024 โย ColorTokens Inc., the leading enterprise microsegmentation company, announced today that Chuck Suitor has joined its Board of Advisors to help accelerate its healthcare presence. Suitor will provide strategic guidance as ColorTokens continues to innovate its differentiated cybersecurity offerings for the healthcare ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..