The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

A Human Centric Tech Revolution in 2024

A Human Centric Tech Revolution in 2024

With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence. Work Needs To Revolve Around Humans, Not The Other Way Around Productivity ...
Businesses Need To Rewrite Their Identity Security Playbook For 2024

Businesses Need To Rewrite Their Identity Security Playbook For 2024

With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...
Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel

Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel

In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President and General Manager of Security and Collaboration, shed light on the company's significant announcements and the profound advancements in the field of cybersecurity. Patel's insights underscore the pivotal role of artificial intelligence (AI) in revolutionising ...
A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For ...
Battling Cyber Scams: Traditional Algorithms Won’t Cut it

Battling Cyber Scams: Traditional Algorithms Won’t Cut it

Australians have experienced a surge in scams, with losses amounting to a staggering $3.1 billion in the past year alone. From a cybersecurity perspective, traditional anti-fraud analytics won’t stem the rising tide of scams. FICO's Vaile Mexted shares five key considerations for the finance sector as it faces an urgent imperative to fortify defences ...
Building Bridges: Developing Cybersecurity Skills And Elevating Talent

Building Bridges: Developing Cybersecurity Skills And Elevating Talent

The cybersecurity sector is at a crossroads, grappling with what can only be described as an existential crisis. The gap in cybersecurity skills has grown to alarming proportions with Australia boasting a shortage of 25,000 to 30,000 cybersecurity professionals in 2022. The escalating complexity of cyber threats, showcased by the 95% increase in ...
Legal Privilege – For Cyber Incidents

Legal Privilege – For Cyber Incidents

A class action lawsuit has been filed against the telecommunications company Optus by former and current customers whose personal information was exposed in a data breach. The lawsuit, representing millions of customers, alleges that Optus failed to protect customer information, breached privacy and telecommunication laws, and did not take proper steps ...
2024 Cybersecurity Predictions from CyberArk

2024 Cybersecurity Predictions from CyberArk

Over 2023, we’ve seen what I like to call the ‘verticalisation of cybersecurity’ taking effect, in that cybersecurity has finally taken centre stage in business discussions. cybersecurity’s impact on business is now recognised across all industries. It has become both a business concern and a disruptive force and has consequently become an integral ...

In The News

Joe Levy Appointed CEO of Sophos

Joe Levy Appointed CEO of Sophos

Sophos has today announced that Joe Levy is now chief executive officer (CEO) of the company. Levy has been acting CEO since Feb. 15. To drive a critical role in the execution of his strategy to shape the future of Sophos, Levy has named Jim Dildine Sophos’ new chief financial officer (CFO) and a member of his senior management team. Levy is a ...
Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Tenable Research has discovered a critical memory corruption vulnerability in Fluent Bit’s built-in HTTP server that could potentially result in denial of service (DoS), information leakage, or remote code execution (RCE). The issue was reported to the project’s maintainers on April 30, 2024. Fixes were committed to the project’s main branch on May 15 ...
SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP

SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP

New Dashboard Provides a Customized, At-A-Glance View of the Entire SAP Security Landscape
Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks

Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks

SYDNEY, Australia, 16 May 2024 – Palo Alto Networks, the global cybersecurity leader, announced today that Australian telecommunications provider, Superloop, has achieved Palo Alto Networks’ MSSP accreditation for Prisma SASE. This accreditation underscores Superloop’s proven expertise in delivering SD-WAN and Cloud Security Services. To obtain this ...
Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident

Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident

"It's important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and mitigate operational risks. 
Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques

Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques

Kinsing malware has previously been seen targeting Linux-based cloud infrastructures, now hitting Apache Tomcat servers
Qualys Names New Managing Director for Australia And New Zealand

Qualys Names New Managing Director for Australia And New Zealand

Qualys, the cybersecurity vulnerability management company, has recently appointed Sam Salehi to be the new Managing Director for Australia & New Zealand. Previously, Salehi was a Sales Director in the Asia Pacific region at Trustwave, which fostered the commercial experience, relationships, and nuanced understanding of the region to take into ...
Github Offers Details On Internal Accessibility Programs; Amplifies Voices Of Disabled Devs

Github Offers Details On Internal Accessibility Programs; Amplifies Voices Of Disabled Devs

GitHub celebrates Global Accessibility Awareness Day by launching another instalment of the Coding Accessibility series and sharing how it scales accessibility within GitHub and beyond

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This