The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
Australian Federal Budget – Whatโ€™s in the bag?

Australian Federal Budget – Whatโ€™s in the bag?

On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australiaโ€™s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion. The Government's key priorities in this Budget are addressing the cost of living, ...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...
The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

Convergence can be significantly aided by having a physical security function that โ€˜leans intoโ€™ the change and has appropriate support systems in place.
How Disjointed Identities have Become a Significant Security Threat

How Disjointed Identities have Become a Significant Security Threat

The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.

In The News

Trend Micro ZDI Hosts Hacking Contest for Vulnerabilities in AI-Enabled Devices

Trend Micro ZDI Hosts Hacking Contest for Vulnerabilities in AI-Enabled Devices

Pwn2Own Ireland underscores Trendโ€™s commitment to securing AI innovations
Quadrant Unveils Free Dark Web Reports That Reveal A Companyโ€™s Leaked Information And Credentials Sitting On The Dark Web

Quadrant Unveils Free Dark Web Reports That Reveal A Companyโ€™s Leaked Information And Credentials Sitting On The Dark Web

Quadrant's Free Dark Web Reports provide a proactive solution for identifying and addressing compromised credentials related to specific organizations. This service lets customers access monthly reports highlighting any newly discovered leaked information. These reports enable organizations to take swift action to secure their environments, such as ...
SecurityBridge Launches Automated Virtual Patching to Safeguard SAP Systems

SecurityBridge Launches Automated Virtual Patching to Safeguard SAP Systems

Virtual Patching is a cross-platform solution that integrates SecurityBridgeโ€™s Patch Management and Threat Detection modules. It offers seamless, real-time defense against vulnerabilities by alerting SAP administrators when unpatched code is detected. The solution protects affected SAP systems until official patches are implemented, allowing ...
Fortinet And National Australia Bank Host Cyber Codefest 2024 To Strengthen Cybersecurity Skills Among TAFE And University Students

Fortinet And National Australia Bank Host Cyber Codefest 2024 To Strengthen Cybersecurity Skills Among TAFE And University Students

Cyber Codefest gives students the opportunity to learn from and network with cybersecurity leadersย 
OpSys Australia Appoints Shanna Daly as Inaugural Chief Information Security Officer

OpSys Australia Appoints Shanna Daly as Inaugural Chief Information Security Officer

Cyber Security Expert to Lead and Align the Companyโ€™s Cyber Security Strategy with Regional Customer Needs
Sophos Appoints Torjus Gylstorff as Sophosโ€™ Chief Revenue Officer

Sophos Appoints Torjus Gylstorff as Sophosโ€™ Chief Revenue Officer

Sophos today announced that Torjus Gylstorff has joined the company as Chief Revenue Officer (CRO). Gylstorff is responsible for driving revenue growth through effective leadership of Sophosโ€™ global sales organisation and partner and customer networks. This includes expanding Sophosโ€™ presence beyond its already strong customer base of more than ...
Informatica Delivers Blueprints to Simplify and Accelerate Generative AI Development on Leading Technology Platforms

Informatica Delivers Blueprints to Simplify and Accelerate Generative AI Development on Leading Technology Platforms

Informatica (NYSE: INFA), a leader in enterprise AI-powered cloud data management, has announced the availability of Generative AI (GenAI) Blueprints that make it faster and easier for customers to build enterprise-grade GenAI applications on six industry-leading technology platforms. The blueprints โ€” for AWS, Databricks, Google Cloud, Microsoft ...
F5 to Supercharge AI Application Delivery for Service Providers and Enterprises with NVIDIA BlueField-3 DPUs

F5 to Supercharge AI Application Delivery for Service Providers and Enterprises with NVIDIA BlueField-3 DPUs

F5 BIG-IP Next for Kubernetes, F5โ€™s new intelligent proxy, combined with NVIDIA BlueField-3 DPUs, transforms application delivery for AI workloads

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This