The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day

Rome was not Built in a Day. Security is not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...

In The News

Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams

Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams

Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams. Criminals are now frequently using victims’ addresses and photos of their homes to better personalize sextortion phishing attacks and increase the pressure to pay. Extortion demands are also increasing from hundreds to thousands of ...
Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage

Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage

Cloudian today announced its integration with NVIDIA Magnum IO™ GPUDirectÒ Storage technology, delivering breakthrough performance of over 200GB/s from a HyperStore system. Cloudian HyperStore® with GPUDirect access simplifies the management of AI training and inference datasets – at petabyte and exabyte scales – while reducing costs by eliminating the ...
KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security

KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security

KPMG in India will make use of SecurityBridge’s SAP security platform to elevate its offerings. Together with SecurityBridge, it will look to offer services that are holistic in its approach all-encompassing, which would include threat monitoring real time and enhancing compliance capabilities.
Logicalis Australia Strengthens Shoalhaven City Council Disaster Recovery And Data Security With Azure

Logicalis Australia Strengthens Shoalhaven City Council Disaster Recovery And Data Security With Azure

Melbourne,  Australia – 19 November 2024: Logicalis Australia, a leading global technology services provider, has assisted Shoalhaven City Council in reviewing their disaster recovery procedures and protecting applications and corporate data by migrating servers to Microsoft Azure. Shoalhaven City Council is a large regional council overseeing 50 ...
Rapid7’s Managed Extended Detection and Response (MXDR) Adds Coverage for Microsoft Security Telemetry

Rapid7’s Managed Extended Detection and Response (MXDR) Adds Coverage for Microsoft Security Telemetry

Rapid7’s latest expansion of its Managed Extended Detection and Response (MXDR) adds coverage for Microsoft security telemetry, which helps customers maximise their security investments and gain comprehensive threat detection and response to take command of their attack surface.
Infoblox Threat Intel identifies new malicious DNS threat actors linked to domain hijacking

Infoblox Threat Intel identifies new malicious DNS threat actors linked to domain hijacking

Hijacking domains using a ‘Sitting Ducks attack’ remain an under-recognised topic in the cybersecurity community. Few threat researchers are familiar with this attack vector and knowledge is scarce. However, the prevalence of these attacks and the risk to organisations are significant. Following its initial publication on Sitting Ducks, Infoblox ...
Diligent Launches AI-Powered Due Diligence Reports For Enhanced Supplier And Third-Party Risk Management

Diligent Launches AI-Powered Due Diligence Reports For Enhanced Supplier And Third-Party Risk Management

Diligent AI-powered reports build on history of industry experience to solve major compliance pain points
F5 Introduces AI Gateway To Manage And Secure Surging AI Traffic And Application Demands

F5 Introduces AI Gateway To Manage And Secure Surging AI Traffic And Application Demands

Manages security for both users and providers of AI services, overseeing authentication and zero trust capabilities Prioritises the consumption of AI services across teams, applications, and APIs Enables integrated automation with AI services and models from OpenAI, cloud providers, open source, and more

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This