The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How CISOs Are Getting Developers to Put Security First

How CISOs Are Getting Developers to Put Security First

CISOs must display leadership and empower their organisations to benchmark and optimise security performance. By doing this, code can be produced efficiently and used securely.
Understanding Insider Threats: A Detailed Look with Insights from the Avis Cyberattack

Understanding Insider Threats: A Detailed Look with Insights from the Avis Cyberattack

Discover how insider threat incidents like the Avis cyberattack challenge organizations and how strategies like microsegmentation can help.
โ€˜If We Had a Mother Like Mine…โ€™ says Global Chief Security Officer from NetApp

โ€˜If We Had a Mother Like Mine…โ€™ says Global Chief Security Officer from NetApp

With over three decades of experience under her belt, Mignona Cotรฉ, Global Chief Security Officer at NetApp, discussed the so called โ€˜basicsโ€™ of cybersecurity to the intricacies of ransomware and AI integration. Adapting to Threats Cotรฉ reflected on the significant changes she has witnessed in the last 30 years. She reminded me of the growing ...
Cloudflare Helps Secure the Worldโ€™s Most Popular Messaging Applications

Cloudflare Helps Secure the Worldโ€™s Most Popular Messaging Applications

Connectivity cloud co, Cloudflare (NYSE: NET) announced Plexi, a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. A longtime Cloudflare verification partner, WhatsApp will be the first to implement this new auditing process to strengthen usersโ€™ trust in the applicationโ€™s encryption method.
How Australian Organisations Can Combat Rising Business Logic Abuse

How Australian Organisations Can Combat Rising Business Logic Abuse

By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According toย Market Data Forecast, the size of the global API market is anticipated to grow 34.7% from 2024 to 2029.ย  ...
Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Anna Perez, business development manager, Wavelink and Connected Healthย  Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; itโ€™s about upholding patient trust and safeguarding ...
The Five Key Processes For Staying Secure With SAP

The Five Key Processes For Staying Secure With SAP

Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.
The Increasing Role Of LLMs And AI In Physical Security

The Increasing Role Of LLMs And AI In Physical Security

The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...

In The News

Elastic Announces AI Ecosystem to Accelerate GenAI Application Development

Elastic Announces AI Ecosystem to Accelerate GenAI Application Development

Elasticsearch vector database integrations with industry-leading AI technology give developers best-in-class resources to expedite the deployment of RAG applications
Check Point Unveils New AI-Powered Network Security Innovations to Raise the Bar on Threat Prevention

Check Point Unveils New AI-Powered Network Security Innovations to Raise the Bar on Threat Prevention

New Check Point Quantum Firewall Software R82 delivers new AI engines, post-quantum encryption, accelerated DevOps, with greater simplicity for data centre operations
Trend Micro Platform Enables Partners to Double Impact and Revenue

Trend Micro Platform Enables Partners to Double Impact and Revenue

Attack surface management capabilities drive adoption by small and medium businesses (SMBs) through Managed Service Providers (MSPs).
Axis Introduces Next-Generation Imaging, AI-Powered Analytics, and Cybersecurity with ARTPEC-9 SoC

Axis Introduces Next-Generation Imaging, AI-Powered Analytics, and Cybersecurity with ARTPEC-9 SoC

Axis Communications, the leading network camera manufacturer, has announced the launch of ARTPEC-9, its next-generation System on Chip (SoC), giving security managers new capabilities in AI-powered analytics, image quality and cybersecurity while reducing storage costs.
Rapid7 Expands Exposure Command With Support For AWS Resource Control Policies

Rapid7 Expands Exposure Command With Support For AWS Resource Control Policies

Rapid7's Exposure Command solution now supports Amazon Web Services (AWS) Resource Control Policies (RCPs). As a launch partner for this powerful feature, Rapid7 now provides additional visibility, insights, and best practices that guide customers in addressing complex enterprise Identity and Access Management (IAM) challenges across the modern attack ...
Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection

Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection

New integration combines Exabeam AI-powered analytics with Wiz's comprehensive cloud security insights to boost threat detection, investigation, and response capabilitiesย 
Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub

Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub

Immediate access to the powerful, highly scalable AI/ML functions of ClearScape Analytics, in a serverless, on-demand compute engine that integrates natively with Fabric and OneLake
Tenable Comment on Annual Cyber Threat Report 2023-2024

Tenable Comment on Annual Cyber Threat Report 2023-2024

The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or credentials. Please find further comments below from Satnam Narang, sr. staff research engineer, Tenable. โ€œThe Annual Cyber Threat Report from the ASDโ€™s ACSC provides insights into ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This