The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How To Quickly Kick Start Holistic SAP Security
SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.
Exclusive: Zero Trust Security – The way Forward for IT and Security
In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities
As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope
The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub.
As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments
When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…
Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
In The News
Tenable November Patch Tuesday Commentary
This month, Microsoft patched four zero-day vulnerabilities, including two that were exploited in the wild. Remote code execution (RCE) vulnerabilities accounted for 58.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 29.9%. A full analysis by Tenable can be found in this blog and commentary from ...
Available Now: YubiKey Bio Series – Multi-Protocol Edition Keys Expand Phishing-Resistant Authentication Options For Enterprises
As adoption of biometric logins continues to increase globally, enterprises and cybersecurity teams require stronger security combined with user convenience to improve user adoption of multi-factor authentication (MFA) and ensure productivity. Hardware security keys that leverage biometrics, like the YubiKey Bio Series, enable organisations to do so by ...
Yubico To Submit YubiKey 5 FIPS Series for FIPS 140-3 Validation
The YubiKey 5 FIPS Series latest 5.7.4 firmware has completed testing by our NIST accredited testing lab, and will be submitted to the Cryptographic Module Validation Program (CMVP) for FIPS 140-3 validation, Overall Level 2 and Physical Level 3. This marks a significant milestone in our ongoing commitment to providing high-assurance security solutions ...
Informatica Expands GenAI-Powered CLAIRE GPT in Europe and Asia Pacific Regions
Informatica (NYSE: INFA), a leader in enterprise AI-powered cloud data management, today announced the expansion of the industry’s first enterprise GenAI-powered data management assistant, CLAIRE® GPT, in Europe and Asia Pacific (APAC)
The King’s Trust Selects NinjaOne to Keep Volunteers and Employees Productive
NinjaOne today announced The King’s Trust selected the NinjaOne Platform™ to simplify IT and boost its productivity. The renowned non-profit organisation is utilising NinjaOne to help volunteers and employees remain productive in the field. NinjaOne is managing thousands of employee and volunteer devices with automated patching and remote access that ...
Matthew Rodgers Joins Wild Tech as Head of Microsoft APAC to Support Regional Growth
Australian-headquartered tech and cyber firm, Wild Tech, is thrilled to announce the appointment of Matthew Rodgers as the company’s new Head of Microsoft APAC, as part of the company’s continued growth across the region.
Rodgers brings over two decades of leadership experience, specialising in digital transformation strategies and enterprise-level ...
AUSCERT’s Cyber Security Predictions For 2025 – Phishing Takedowns Increase, Australia To Enhance Global Collaboration, Deep Fakes To Fuel Phishing Attacks, Organisation-Wide Training To Increase
Amongst the key trends, AUSCERT General Manager, Dr Ivano Bongiovanni announces that AUSCERT will step up efforts in 2025 to increase phishing takedowns attempts to protect more small and medium sized businesses.
Tesserent’s Cyber Security Predictions For 2025 – Rise Of Social Engineering Cyber-Attacks Fueled By AI And More Attacks On Critical Infrastructure
Amongst the key trends, Jason Plumridge, Chief Information Security Officer, Tesserent warns that we will see escalating social engineering attacks, but this time powered by AI. AI will also be leveraged to step up attacks on critical infrastructure.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..