The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope

Deepfakes and the US Election | A Slippery Slope

The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…

Technology Company Names Have More Meaning than We Expected…

Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI

Exploring Opportunities, Fears, and the Future with AI

Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
Why Robust Disaster Recovery Is a USP for MSPs

Why Robust Disaster Recovery Is a USP for MSPs

As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...

In The News

AUSCERT’s Cyber Security Predictions For 2025 – Phishing Takedowns Increase, Australia To Enhance Global Collaboration, Deep Fakes To Fuel Phishing Attacks, Organisation-Wide Training To Increase

AUSCERT’s Cyber Security Predictions For 2025 – Phishing Takedowns Increase, Australia To Enhance Global Collaboration, Deep Fakes To Fuel Phishing Attacks, Organisation-Wide Training To Increase

Amongst the key trends, AUSCERT General Manager, Dr Ivano Bongiovanni announces that AUSCERT will step up efforts in 2025 to increase phishing takedowns attempts to protect more small and medium sized businesses.  
Tesserent’s Cyber Security Predictions For 2025 – Rise Of Social Engineering Cyber-Attacks Fueled By AI And More Attacks On Critical Infrastructure

Tesserent’s Cyber Security Predictions For 2025 – Rise Of Social Engineering Cyber-Attacks Fueled By AI And More Attacks On Critical Infrastructure

Amongst the key trends, Jason Plumridge, Chief Information Security Officer, Tesserent warns that we will see escalating social engineering attacks, but this time powered by AI.  AI will also be leveraged to step up attacks on critical infrastructure. 
Logicalis Becomes The First Global Partner To Launch Cisco XDR As A Managed Service

Logicalis Becomes The First Global Partner To Launch Cisco XDR As A Managed Service

11 November 2024 — Logicalis, a leading global digital managed services provider, has become the first global Cisco partner to launch Cisco Extended Detection and Response (XDR) as a Managed Service (MXDR).   This global service forms part of the recently launched Intelligent Security portfolio and increases Logicalis' proactive ...
Kyndryl Survey, Conducted With AWS, Reveals Cybersecurity Readiness Gap In Australian And New Zealand Enterprises

Kyndryl Survey, Conducted With AWS, Reveals Cybersecurity Readiness Gap In Australian And New Zealand Enterprises

Survey of enterprises in Australia and New Zealand confirms disconnect between cyber preparedness and readiness Urgent need for improved awareness and cyber resilience strategies amid rising threats
Fortinet Continues to Expand Generative AI Across Its Portfolio With Two New Additions To Simplify Security Operations

Fortinet Continues to Expand Generative AI Across Its Portfolio With Two New Additions To Simplify Security Operations

FortiAI now spans seven unique Fortinet products with new generative AI integrations for FortiNDR Cloud to accelerate threat coverage analysis and Lacework FortiCNAPP to streamline investigation 
Quadrant’s Security Operations Center Experts Receive 2024 SOC Analyst Appreciation Awards

Quadrant’s Security Operations Center Experts Receive 2024 SOC Analyst Appreciation Awards

Quadrant congratulates Charles Goggins, Joshua Hall, and Joshua Hubner for their exceptional achievements and dedication to advancing cybersecurity within the SOC. Their recognition highlights Quadrant's commitment to fostering talent and enhancing cybersecurity resilience.
WatchGuard Earns Top Awards from TrustRadius for Network and Endpoint Security, and Multi-Factor Authentication

WatchGuard Earns Top Awards from TrustRadius for Network and Endpoint Security, and Multi-Factor Authentication

TrustRadius accolades across product categories add to broad recognition for WatchGuard’s comprehensive cybersecurity platform
Elastic Enables Innovation in Next Generation Knowledge Management with LG CNS

Elastic Enables Innovation in Next Generation Knowledge Management with LG CNS

Elasticsearch enhances LG CNS’s KeyLook AI with hybrid search, achieving a 95% increase in search relevance to dramatically improve the accessibility and usability of corporate knowledge

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This