The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

New Tenable Research Reveals Only 3% of Vulnerabilities  Pose Significant Cybersecurity Risk

New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk

Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities
From Dollars to Digital – Your Guide to Investing Safely

From Dollars to Digital – Your Guide to Investing Safely

Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know common misconceptions and reasons for the hesitancy include beliefs the pricing ...
The Evolving Threat Landscape Facing Australiaโ€™s Banks

The Evolving Threat Landscape Facing Australiaโ€™s Banks

The increasing reliance on digital and mobile banking has created new opportunities for fraudsters. While digital banking offers convenience and efficiency, it also introduces new vulnerabilities. The move away from in-person interactions has made it easier for cybercriminals to target individuals and carry out fraudulent activities online.
Why โ€˜Secure by Designโ€™ Is Critical In Todayโ€™s Interconnected World

Why โ€˜Secure by Designโ€™ Is Critical In Todayโ€™s Interconnected World

Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturityโ€”and individual developer security skillsโ€”will be paramount in facilitating the right growth and knowledge building.
Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...

In The News

OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

ย Next-generation cloud, security, AI-integrated innovationsย unveiled at OpenText World 2024ย  About OpenText OpenText, The Information Companyโ„ข, enables organisations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions. For more information about OpenText (NASDAQ: OTEX, TSX: OTEX) ...
Informatica Tackles Microsoft Azure Megatrends of GenAI, Microsoft Fabric and Open Table Format with New Capabilities ย 

Informatica Tackles Microsoft Azure Megatrends of GenAI, Microsoft Fabric and Open Table Format with New Capabilities ย 

The advanced solutions include an easy-to-implement Blueprint for Azure OpenAI Service, enhanced SQL ELT and support for Apache Iceberg open table format
Arctic Wolf Builds on the Arctic Wolf Aurora Platform with New Threat Intelligence Module

Arctic Wolf Builds on the Arctic Wolf Aurora Platform with New Threat Intelligence Module

Arctic Wolfยฎ, a global leader in security operations, today announced the expansion of theย Arctic Wolf AuroraTMย Platformย with the addition of Arctic Wolf Threat Intelligence, a new module that allows organisations to stay ahead of threats by gaining access to real-time threat intelligence and curated reporting.
Threat Spotlight: Bad Bots are Evolving to Become More ‘Human’

Threat Spotlight: Bad Bots are Evolving to Become More ‘Human’

The bot landscape is changing. Malicious โ€” or bad bots โ€” are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which we might think of as โ€œgrey bots,โ€ is blurring the boundary of legitimate activity. Barracuda security researchers analyzed bot-related traffic and activity targeting web ...
Rubrik Delivers Cyber Resilience Solution for Microsoft Azure Blob Storage

Rubrik Delivers Cyber Resilience Solution for Microsoft Azure Blob Storage

Rubrik, Inc. today announced a new cyber resilience solution for Microsoft Azure Blob Storage. As organisations become increasingly dependent on the cloud, there is an inherent risk for security blind spots and vulnerable sensitive data. Rubrik brings cyber posture and cyber recovery to provide Microsoft Azure Blob Storage customers further visibility ...
Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams

Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams

Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams. Criminals are now frequently using victimsโ€™ addresses and photos of their homes to better personalize sextortion phishing attacks and increase the pressure to pay. Extortion demands are also increasing from hundreds to thousands of ...
Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage

Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage

Cloudian today announced its integration with NVIDIA Magnum IOโ„ข GPUDirectร’ Storage technology, delivering breakthrough performance of over 200GB/s from a HyperStore system. Cloudian HyperStoreยฎ with GPUDirect access simplifies the management of AI training and inference datasets โ€“ at petabyte and exabyte scales โ€“ while reducing costs by eliminating the ...
KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security

KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security

KPMGย in India will make use of SecurityBridgeโ€™s SAP security platform to elevate its offerings. Together with SecurityBridge, it will look to offer services that are holistic in its approach all-encompassing, which would include threat monitoring real time and enhancing compliance capabilities.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This