The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
From Dollars to Digital – Your Guide to Investing Safely
Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know common misconceptions and reasons for the hesitancy include beliefs the pricing ...
The Evolving Threat Landscape Facing Australiaโs Banks
The increasing reliance on digital and mobile banking has created new opportunities for fraudsters. While digital banking offers convenience and efficiency, it also introduces new vulnerabilities. The move away from in-person interactions has made it easier for cybercriminals to target individuals and carry out fraudulent activities online.
Why โSecure by Designโ Is Critical In Todayโs Interconnected World
Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturityโand individual developer security skillsโwill be paramount in facilitating the right growth and knowledge building.
Ransom Data Should Be Made Public
The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity
Good AI and Cybersecurity Relies On Resilient Data
General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)
Introduction
Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, itโs a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
In The News
Arctic Wolf Builds on the Arctic Wolf Aurora Platform with New Threat Intelligence Module
Arctic Wolfยฎ, a global leader in security operations, today announced the expansion of theย Arctic Wolf AuroraTMย Platformย with the addition of Arctic Wolf Threat Intelligence, a new module that allows organisations to stay ahead of threats by gaining access to real-time threat intelligence and curated reporting.
Threat Spotlight: Bad Bots are Evolving to Become More ‘Human’
The bot landscape is changing. Malicious โ or bad bots โ are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which we might think of as โgrey bots,โ is blurring the boundary of legitimate activity.
Barracuda security researchers analyzed bot-related traffic and activity targeting web ...
Rubrik Delivers Cyber Resilience Solution for Microsoft Azure Blob Storage
Rubrik, Inc. today announced a new cyber resilience solution for Microsoft Azure Blob Storage. As organisations become increasingly dependent on the cloud, there is an inherent risk for security blind spots and vulnerable sensitive data. Rubrik brings cyber posture and cyber recovery to provide Microsoft Azure Blob Storage customers further visibility ...
Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams
Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams. Criminals are now frequently using victimsโ addresses and photos of their homes to better personalize sextortion phishing attacks and increase the pressure to pay. Extortion demands are also increasing from hundreds to thousands of ...
Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage
Cloudian today announced its integration with NVIDIA Magnum IOโข GPUDirectร Storage technology, delivering breakthrough performance of over 200GB/s from a HyperStore system. Cloudian HyperStoreยฎ with GPUDirect access simplifies the management of AI training and inference datasets โ at petabyte and exabyte scales โ while reducing costs by eliminating the ...
KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security
KPMGย in India will make use of SecurityBridgeโs SAP security platform to elevate its offerings. Together with SecurityBridge, it will look to offer services that are holistic in its approach all-encompassing, which would include threat monitoring real time and enhancing compliance capabilities.
Logicalis Australia Strengthens Shoalhaven City Council Disaster Recovery And Data Security With Azure
Melbourne,โฏ Australiaโฏโ 19 November 2024: Logicalis Australia, a leading global technology services provider, has assisted Shoalhaven City Council in reviewing their disaster recovery procedures and protecting applications and corporate data by migrating servers to Microsoft Azure.
Shoalhaven City Council is a large regional council overseeing 50 ...
Rapid7โs Managed Extended Detection and Response (MXDR) Adds Coverage for Microsoft Security Telemetry
Rapid7โs latest expansion of its Managed Extended Detection and Response (MXDR) adds coverage for Microsoft security telemetry, which helps customers maximise their security investments and gain comprehensive threat detection and response to take command of their attack surface.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..