The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Monitoring Can Enhance An Organisationโ€™s Security Protection

How Monitoring Can Enhance An Organisationโ€™s Security Protection

Network monitoring is important in maintaining optimal IT infrastructure performance and security. Such software plays a role in monitoring various network parameters, ensuring security through features like overload protection, automatic log out, and prevention of malicious code execution. The critical role of network monitoring in safeguarding ...
Where Australian Organisations Go Wrong With Cyber Risk Quantification

Where Australian Organisations Go Wrong With Cyber Risk Quantification

The promise of getting directors, executives and cyber teams all talking the same language can be challenging to accomplish and bring unintended consequences.
Singapore’s Minister Mrs Josephine Teo Discusses Digital Transformation and Women’s Leadership with Oracle’s CEO Safra Catz

Singapore’s Minister Mrs Josephine Teo Discusses Digital Transformation and Women’s Leadership with Oracle’s CEO Safra Catz

Recently at the Oracle CloudWorld Tour held at the Shangri-La in Singapore, Oracle's CEO Safra Catz, Singapore's Minister for Communications and Information and Second Minister for Home Affairs, Mrs Josephine Teo, highlighted the critical role of digital transformation in Singapore's development and shared insights on empowering women in leadership ...
Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit

Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit
The Conversations Boards Should Have About Cybersecurity

The Conversations Boards Should Have About Cybersecurity

Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...
Advancing Security and Resilience: Insights from AWS Summit in Sydney

Advancing Security and Resilience: Insights from AWS Summit in Sydney

At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia

The Glimpse at the Future of Software Academia

Software is key to a computersโ€™ functionality and in fact, a system canโ€™t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has itsโ€™ origins in ...

In The News

New CrowdStrike Partnerships Accelerate Adoption Of Industry-Leading Falcon Threat Intelligence

New CrowdStrike Partnerships Accelerate Adoption Of Industry-Leading Falcon Threat Intelligence

AUSTIN, Texas โ€“ October 8, 2024 โ€”ย CrowdStrikeย (NASDAQ: CRWD) today announced new strategic partnerships with CardinalOps, Nagomi Security and Veriti to deliver intelligence-led threat defense across the enterprise. Intelligence-led decision making is crucial to effective cybersecurity. With security teams often using a wide range of solutionsโ€”each ...
Tenable Research Finds 74% of Organisations Have Publicly Exposed Storage Assets, Increasing Risk of Ransomware Attacks

Tenable Research Finds 74% of Organisations Have Publicly Exposed Storage Assets, Increasing Risk of Ransomware Attacks

Theย Tenable Cloud Risk Report 2024, published today, reveals that a staggering 74% of organisations have publicly exposed storage assets, including those containing sensitive data, making them vulnerable to ransomware attacks. This exposure is often caused by unnecessary or excessive permissions, granting wider access to cloud-stored information than ...
From AustCyber to ACN: A New Era of Cyber Security Collaboration and Innovation for Australia

From AustCyber to ACN: A New Era of Cyber Security Collaboration and Innovation for Australia

Canberra, 9 October 2024ย โ€“ Over 94,000 cybercrime incidents were reported in Australia last financial year. Equivalent to one every six minutes and with the Australian Signals Directorate contacting businesses 620 times during this period to warn of potential threats, can you believe 280 of those calls went unanswered. Something needs to change in ...
Tecala Announces Security Operations Partnership with Arctic Wolf in Australia

Tecala Announces Security Operations Partnership with Arctic Wolf in Australia

Security Operations Leader Arctic Wolf will Provide Tecala Customers Industry-Leading Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks
Alex Trafton Takes Out New Title With G42 As Senior Vice President

Alex Trafton Takes Out New Title With G42 As Senior Vice President

The appointment of Alex Trafton as Senior Vice President, Technology Risk Management, G42 marks a new leaf for both the Executive and G42. His expertise in cybersecurity combined with his strategic vision promises to drive forward innovative solutions that address contemporary challenges. Trafton based out of California in the United States will be ...
Check Point Software Named a Leader in Enterprise Firewall Solutions Evaluation, According to Independent Research Firm

Check Point Software Named a Leader in Enterprise Firewall Solutions Evaluation, According to Independent Research Firm

Check Point excels with collaborative tools, and received the highest possible score in 13 criteria, including Vision, Innovation, and Threat Intelligenceย ย ย 
Forescout Finds 14 Vulnerabilities in Popular DrayTek Routers Affecting Hundreds of Thousands of Exposed Devices Globally

Forescout Finds 14 Vulnerabilities in Popular DrayTek Routers Affecting Hundreds of Thousands of Exposed Devices Globally

Forescout today published the โ€œDRAY:BREAKโ€ Research Report. The report identifies 14 previously unknown vulnerabilities in routers manufactured by DrayTek, a Taiwanese networking equipment manufacturer, including one with the highest possible severity rating of 10. If left unaddressed, attackers could gain full control over these devices, opening the ...
The 2024 Elastic Global Threat Report: Basic Security Settings Are Easily Exploited by Adversaries

The 2024 Elastic Global Threat Report: Basic Security Settings Are Easily Exploited by Adversaries

Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This