The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...

In The News

Who Knew? Domain Hijacking Is So Easy

Who Knew? Domain Hijacking Is So Easy

Sydney, 13 August:  Researchers at Infoblox and Eclypsium have discovered that a powerful attack vector in the domain name system (DNS) is being widely exploited across many DNS providers. We have found that over a dozen Russian-nexus cybercriminal actors are using this attack vector to hijack domain names without being noticed. We call this ...
Palo Alto Networks Rolls Out Secure AI by Design Portfolio

Palo Alto Networks Rolls Out Secure AI by Design Portfolio

Availability of industry’s first AI-powered cybersecurity solutions to defend against AI threats, safeguard models, and enable controls and visibility
Palo Alto Networks Hosts Cybersecurity Workshop in Sydney to Tackle Digital Safety

Palo Alto Networks Hosts Cybersecurity Workshop in Sydney to Tackle Digital Safety

Palo Alto Networks, the global cybersecurity leader, hosted its first Cyber Safe Kids Family Workshop on Sunday, 11 August. The free interactive workshop for parents and children aged 7-12, brought together families from across Sydney to equip them with the skills and knowledge for navigating the digital world with greater confidence and ...
Optus Launches new Artificial Intelligence and Machine Learning Tool to Combat Enterprise Cyber Threats

Optus Launches new Artificial Intelligence and Machine Learning Tool to Combat Enterprise Cyber Threats

Optus is the first Managed Service Provider (MSP) in Australia to partner with Devo Inc. Using the Devo Security Data Platform, Optus will achieve real-time visibility of potential and emerging network threats. The platform leverages cutting edge technology including Artificial (AI) Intelligence to identify and detect threats. The new automated ...
Cyber Threats Continue to Plague Australian Businesses As Organisations Agree to Ransoms

Cyber Threats Continue to Plague Australian Businesses As Organisations Agree to Ransoms

New Cloudflare survey finds 50% of organisations have paid ransoms in the last two years despite pledging not to
SAP Enterprise Cloud Services Selects CyberArk to Safeguard the World’s Largest Organisations

SAP Enterprise Cloud Services Selects CyberArk to Safeguard the World’s Largest Organisations

CyberArk (NASDAQ: CYBR), the identity security company, today announced that SAP Enterprise Cloud Services (ECS) will implement CyberArk to secure privileged and sensitive access to their cloud services with zero standing privileges, protecting client data and allowing for easier auditing. SAP ECS is the biggest private cloud in the world. With ...
VAST Data Announces Amy Shapero as Company’s First Chief Financial Officer

VAST Data Announces Amy Shapero as Company’s First Chief Financial Officer

VAST Data today named Amy Shapero as its first ever Chief Financial Officer (CFO). As the company prepares for its next stage of growth, this strategic appointment will enable VAST to scale faster, better serve customers and further expand VAST’s global business while accelerating market adoption of the only data platform built for the AI ...
SentinelOne® and Intezer Team to Simplify Reverse Engineering of Rust Malware

SentinelOne® and Intezer Team to Simplify Reverse Engineering of Rust Malware

Companies developing methodology and open-source tools to tame complexities of complex language, empowering organizations to get and stay ahead of attackers  LAS VEGAS, NV - August  7, 2024 - SentinelOne  (NYSE: S), a global leader in AI-powered security, and Intezer, a leader in AI-powered technology for autonomous security operations, today launched ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This