The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities
As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope
The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub.
As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments
When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…
Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI
Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
Why Robust Disaster Recovery Is a USP for MSPs
As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...
In The News
AUSCERT’s Cyber Security Predictions For 2025 – Phishing Takedowns Increase, Australia To Enhance Global Collaboration, Deep Fakes To Fuel Phishing Attacks, Organisation-Wide Training To Increase
Amongst the key trends, AUSCERT General Manager, Dr Ivano Bongiovanni announces that AUSCERT will step up efforts in 2025 to increase phishing takedowns attempts to protect more small and medium sized businesses.
Tesserent’s Cyber Security Predictions For 2025 – Rise Of Social Engineering Cyber-Attacks Fueled By AI And More Attacks On Critical Infrastructure
Amongst the key trends, Jason Plumridge, Chief Information Security Officer, Tesserent warns that we will see escalating social engineering attacks, but this time powered by AI. AI will also be leveraged to step up attacks on critical infrastructure.
Logicalis Becomes The First Global Partner To Launch Cisco XDR As A Managed Service
11 November 2024 — Logicalis, a leading global digital managed services provider, has become the first global Cisco partner to launch Cisco Extended Detection and Response (XDR) as a Managed Service (MXDR).
This global service forms part of the recently launched Intelligent Security portfolio and increases Logicalis' proactive ...
Kyndryl Survey, Conducted With AWS, Reveals Cybersecurity Readiness Gap In Australian And New Zealand Enterprises
Survey of enterprises in Australia and New Zealand confirms disconnect between cyber preparedness and readiness Urgent need for improved awareness and cyber resilience strategies amid rising threats
Fortinet Continues to Expand Generative AI Across Its Portfolio With Two New Additions To Simplify Security Operations
FortiAI now spans seven unique Fortinet products with new generative AI integrations for FortiNDR Cloud to accelerate threat coverage analysis and Lacework FortiCNAPP to streamline investigation
Quadrant’s Security Operations Center Experts Receive 2024 SOC Analyst Appreciation Awards
Quadrant congratulates Charles Goggins, Joshua Hall, and Joshua Hubner for their exceptional achievements and dedication to advancing cybersecurity within the SOC. Their recognition highlights Quadrant's commitment to fostering talent and enhancing cybersecurity resilience.
WatchGuard Earns Top Awards from TrustRadius for Network and Endpoint Security, and Multi-Factor Authentication
TrustRadius accolades across product categories add to broad recognition for WatchGuard’s comprehensive cybersecurity platform
Elastic Enables Innovation in Next Generation Knowledge Management with LG CNS
Elasticsearch enhances LG CNS’s KeyLook AI with hybrid search, achieving a 95% increase in search relevance to dramatically improve the accessibility and usability of corporate knowledge
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..