The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How CISOs Are Getting Developers to Put Security First
CISOs must display leadership and empower their organisations to benchmark and optimise security performance. By doing this, code can be produced efficiently and used securely.
Understanding Insider Threats: A Detailed Look with Insights from the Avis Cyberattack
Discover how insider threat incidents like the Avis cyberattack challenge organizations and how strategies like microsegmentation can help.
โIf We Had a Mother Like Mine…โ says Global Chief Security Officer from NetApp
With over three decades of experience under her belt, Mignona Cotรฉ, Global Chief Security Officer at NetApp, discussed the so called โbasicsโ of cybersecurity to the intricacies of ransomware and AI integration.
Adapting to Threats
Cotรฉ reflected on the significant changes she has witnessed in the last 30 years. She reminded me of the growing ...
Cloudflare Helps Secure the Worldโs Most Popular Messaging Applications
Connectivity cloud co, Cloudflare (NYSE: NET) announced Plexi, a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. A longtime Cloudflare verification partner, WhatsApp will be the first to implement this new auditing process to strengthen usersโ trust in the applicationโs encryption method.
How Australian Organisations Can Combat Rising Business Logic Abuse
By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies
As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According toย Market Data Forecast, the size of the global API market is anticipated to grow 34.7% from 2024 to 2029.ย ...
Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices
Anna Perez, business development manager, Wavelink and Connected Healthย
Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; itโs about upholding patient trust and safeguarding ...
The Five Key Processes For Staying Secure With SAP
Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.
The Increasing Role Of LLMs And AI In Physical Security
The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...
In The News
Elastic Announces AI Ecosystem to Accelerate GenAI Application Development
Elasticsearch vector database integrations with industry-leading AI technology give developers best-in-class resources to expedite the deployment of RAG applications
Check Point Unveils New AI-Powered Network Security Innovations to Raise the Bar on Threat Prevention
New Check Point Quantum Firewall Software R82 delivers new AI engines, post-quantum encryption, accelerated DevOps, with greater simplicity for data centre operations
Trend Micro Platform Enables Partners to Double Impact and Revenue
Attack surface management capabilities drive adoption by small and medium businesses (SMBs) through Managed Service Providers (MSPs).
Axis Introduces Next-Generation Imaging, AI-Powered Analytics, and Cybersecurity with ARTPEC-9 SoC
Axis Communications, the leading network camera manufacturer, has announced the launch of ARTPEC-9, its next-generation System on Chip (SoC), giving security managers new capabilities in AI-powered analytics, image quality and cybersecurity while reducing storage costs.
Rapid7 Expands Exposure Command With Support For AWS Resource Control Policies
Rapid7's Exposure Command solution now supports Amazon Web Services (AWS) Resource Control Policies (RCPs). As a launch partner for this powerful feature, Rapid7 now provides additional visibility, insights, and best practices that guide customers in addressing complex enterprise Identity and Access Management (IAM) challenges across the modern attack ...
Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection
New integration combines Exabeam AI-powered analytics with Wiz's comprehensive cloud security insights to boost threat detection, investigation, and response capabilitiesย
Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub
Immediate access to the powerful, highly scalable AI/ML functions of ClearScape Analytics, in a serverless, on-demand compute engine that integrates natively with Fabric and OneLake
Tenable Comment on Annual Cyber Threat Report 2023-2024
The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or credentials. Please find further comments below from Satnam Narang, sr. staff research engineer, Tenable.
โThe Annual Cyber Threat Report from the ASDโs ACSC provides insights into ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..