The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...

In The News

Digital Infrastructure Partnership Boosts Australian Business Confidence, Backs Economic Growth Across the Region

Digital Infrastructure Partnership Boosts Australian Business Confidence, Backs Economic Growth Across the Region

QUEENSLAND, Australia – 9 December 2024 – NetApp, the intelligent data infrastructure company, has announced that its strategic partnership with Australian data centre and cloud services group, iseek has grown exponentially, with NetApp now managing 5X the volume of data compared to when they first partnered together eight years ago, as enterprises, ...
Fortinet achieves the highest possible “AAA” rating on the industry’s only independent, third-party security service edge test

Fortinet achieves the highest possible “AAA” rating on the industry’s only independent, third-party security service edge test

FortiSASE earned high scores in all four test categories, highlighting its ability to deliver robust, cloud-delivered security while ensuring efficient network performance 
FedRAMP® Authorization Cements Trend Micro as Zero Trust Compliance Leader

FedRAMP® Authorization Cements Trend Micro as Zero Trust Compliance Leader

SYDNEY, December 6, 2024 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced its latest platform compliance achievement: Trend Vision One™ for Government has obtained a FedRAMP® Authorization to Operate (ATO). This milestone enables Federal government customers to leverage Trend’s platform to rapidly stop ...
Nozomi Networks and Advens Team to Deliver Advanced Cybersecurity Services to Industrial and Critical Infrastructure Environments

Nozomi Networks and Advens Team to Deliver Advanced Cybersecurity Services to Industrial and Critical Infrastructure Environments

• Nozomi Networks OT and IoT visibility, threat detection and risk management capabilities now part of Advens Managed Security Services offered to customers countries across Europe • Paris Olympics joins a growing list of customers benefiting from this MSSP partnership
SecurityBridge Partners with Altum Strategy Group to Bridge SAP Security Gaps For Small and Medium-Sized Businesses

SecurityBridge Partners with Altum Strategy Group to Bridge SAP Security Gaps For Small and Medium-Sized Businesses

By adding SecurityBridge’s solution, Altum will now offer its customers the ability to address SAP security with Altum’s deep expertise and strategic thinking and SecurityBridge’s cybersecurity solution. 
OpenText Partners with Secure Code Warrior to Deliver Comprehensive Application Security and Customised Developer Risk Management

OpenText Partners with Secure Code Warrior to Deliver Comprehensive Application Security and Customised Developer Risk Management

The new agreement empowers development teams with continuous upskilling to turn security into a strategic advantage, reduce risks, and elevate customer trust
Elastic Awarded A 2024 AWS Partner Award

Elastic Awarded A 2024 AWS Partner Award

Elastic recognised as the AWS Global Generative AI Infrastructure and Data Partner of the Year
New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack

New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack

NetApp® (NASDAQ: NTAP), the intelligent data infrastructure company, today announced the release of its latest report analysing the state of cybersecurity and offering actionable insights to help organisations strengthen their cyber resiliency. The Futurum Group study, "Cloud, Complexity, AI: The Triple Threat Demanding New Cyber Resilience Strategies" ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This