The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director
I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...
Taking a Zero Trust Approach to Managing IoT in Manufacturing
As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.
Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers
World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the countryโs most vulnerable.
What you missed at TechLeaders 2024
I recently headed down to TechLeaders, which was hosted at Kirkton Park in the Hunter Valley.
TechLeaders Australia is dedicated to the Australian technology industry. It serves as a platform for professionals, businesses, and organisations to connect, collaborate, and stay informed about the latest trends and developments in the tech sector. This ...
How AI is Helping to Strengthen Corporate Cybersecurity
As AI continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital.
Acting With Intent With AI
The need for intention
Jim Carrey said, โNot one single thing has ever been accomplished without intentionโ.
When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of achieving some sort of progress after itโs done.
Modern artificial intelligence ...
Opening Up Cloud Architecture For Safer Security Infrastructure
The evolution of the humble security camera into a cloud-connected multifunction safety device we see used today has come with a plethora of new capabilities and opportunities for security practitioners. Yet with internet-connected devices come risks.ย Let's explore why open-source architectures are, in fact, more secure while offering greater ...
Sports Venues Must Vet Their Vendors To Maintain Security
High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ticketing, ...
In The News
Yubico Announces Yubico Enrollment Suite for Microsoft users, a Turnkey Passwordless Onboarding Experience
November 20, 2024 โ Todayย Yubicoย (NASDAQ: YUBICO), the leading provider of hardware authentication security keys, announced the availability ofย Yubico Enrollment Suiteย for Microsoft users, includingย Yubico FIDO Pre-regย and the newย YubiEnroll. These solutions integrate with Microsoftโs Entra ID, helping organisations create stronger cyber resilience and ...
Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected
Organisations are reassessing their cybersecurity budget allocations after taking 5.9 months to recover from incidents in 2024 - over a month longer than expected
Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available
As the digital landscape grows increasingly interconnected, defenders face a critical challenge: the data and insights from various security tools are often siloed or, at best, loosely integrated. This fragmented approach makes it difficult to gain a holistic view of threats or assess their potential impact on critical assets. In a world where a single ...
Thales Expands CipherTrust Data Security Platform as-a-Service Offerings
CipherTrust Transparent Encryption helps organisations meet compliance mandates and protect data wherever it resides New Cloud Service includes Live Data Transformation for non-disruptive encryption and Ransomware Protection to monitor continuously for abnormal activity
Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector
On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, willย testifyย in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus ...
Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report
Genetec bolsters #2 global ranking with six consecutive years of organic growth
OpenText Launches New Partner Enterprise Learning Subscription
New program helps Partners build skills and gives customers confidence in their Partner choiceย
The Dark Side of Domain-Specific Languages: Tenable Uncovers New Attack Techniques in Open Source Software
Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has uncovered new attack techniques in Domain-Specific Languages (DSLs) of popular policy-as-code (PaC) and infrastructure-as-code (IaC) platforms. These can lead to compromised cloud identities, lateral movement, and data ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..