The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Security Threat Posed by ‘Zombie’ APIs

The Security Threat Posed by ‘Zombie’ APIs

Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs). The challenge of ‘zombie APIs’ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australia’s finance sector needs

PAM may be the infosec pressure relief valve Australia’s finance sector needs

Information security is a journey, but calls of, ‘Are we there yet?’ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.
DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.

In The News

Infoblox Threat Intel Discovers Muddling Meerkat, a DNS Operation Controlling China’s Great Firewall

Infoblox Threat Intel Discovers Muddling Meerkat, a DNS Operation Controlling China’s Great Firewall

Infoblox Inc., a leader in cloud networking and security services, today announced that its threat intel researchers, in collaboration with external researchers, have uncovered ‘Muddling Meerkat’, a likely People's Republic of China (PRC) state actor with the ability to control the Great Firewall (GFW) of China, a system that censors and manipulates ...
Proofpoint: 59% of ASX 200 Companies at Risk of Email Fraud

Proofpoint: 59% of ASX 200 Companies at Risk of Email Fraud

Australian organisations lag behind global counterparts in basic email protection, Proofpoint analysis reveals
The Australian Organisations Looking to Generative AI to Boost Security Operations

The Australian Organisations Looking to Generative AI to Boost Security Operations

AustralianSuper, Powerlink Queensland and TAL among the first organisations exploring Microsoft’s Copilot for Security to enhance defence capabilities
Fastly Recognised as a Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection for Sixth Consecutive Year

Fastly Recognised as a Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection for Sixth Consecutive Year

SAN FRANCISCO – April 29, 2024 – Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, today announced it was named a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection (WAAP) for the sixth consecutive year – and the only vendor to be recognised for six years running. Based on reviews from ...
Logicalis Australia Appoints John Griffin As Chief Technology Officer

Logicalis Australia Appoints John Griffin As Chief Technology Officer

Melbourne, Australia – 29 April 2024: Logicalis Australia, a leading global technology services provider, has announced the appointment of John Griffin as chief technology officer (CTO) in a strategic move that underscores the organisation's commitment to innovation and excellence in the rapidly evolving IT landscape. John brings a wealth of ...
Zscaler Introduces First of Its Kind Digital Experience Monitoring Copilot to Enable IT Support and Operations with AI

Zscaler Introduces First of Its Kind Digital Experience Monitoring Copilot to Enable IT Support and Operations with AI

Zscaler Digital Experience (ZDX) Copilot effortlessly unlocks network, device, and application performance insights in real-time to help quickly resolve issues impacting end users
SolarWinds Launches Consultative Sales Model to Help Customers Maximise Value of ITSM Solutions

SolarWinds Launches Consultative Sales Model to Help Customers Maximise Value of ITSM Solutions

SolarWinds is a leading provider of simple, powerful, secure observability and IT management software. The company has unveiled a groundbreaking new consultative approach to maximise the value of IT service management (ITSM) solutions for enterprises without the burdensome costs and staffing requirements typically associated with high-level IT ...
Github: Securing Millions Of Developers Through 2FA

Github: Securing Millions Of Developers Through 2FA

GitHub, the world’s leading AI-powered developer platform, has released the early results of its two-factor authentication (2FA) requirements for code contributors on GitHub.com–which was first announced in 2022 and rolled out across 2023–in efforts to secure developer accounts and prevent the next supply chain attack. Over the last two years, it has ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This