The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.
Four steps organisations can take to improve cybersecurity awareness

Four steps organisations can take to improve cybersecurity awareness

October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).
Five common challenges with securing cloud-based applications

Five common challenges with securing cloud-based applications

The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.
The overlap between physical and digital security – how to get smart with compliance

The overlap between physical and digital security – how to get smart with compliance

Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of ...
Espionage Fuels Global Cyberattacks

Espionage Fuels Global Cyberattacks

In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
Cybersecurity Incidents Are Now Full-Scale Crisis Management

Cybersecurity Incidents Are Now Full-Scale Crisis Management

Cybersecurity incidents have typically been viewed through a technical lens.
Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Research: A Deep Dive into Stream-Jacking Attacks on YouTube

Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.
Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...

In The News

Average Ransomware Payment in Australia More than Triples in the Last Year, Finds Sophos State of Ransomware Report

Average Ransomware Payment in Australia More than Triples in the Last Year, Finds Sophos State of Ransomware Report

Sophos today released its annual “State of Ransomware 2024” survey report, which found that the average ransom payment has increased by 297% in the last year. Australian organisations that paid the ransom reported an average payment of US$6 million, up from $1.51 million in 2023, and more than $2 million above the global average ($3.96 million). ...
SecurityBridge Expands U.S. Partnerships With Taciti Consulting Alliance

SecurityBridge Expands U.S. Partnerships With Taciti Consulting Alliance

The partnership is poised to offer stronger security measures and a unified approach to SAP application security. This unity is timely, considering every SAP installation must transition to S/4HANA by 2027. Combined Efforts Streamline SAP S/4HANA Transformations and Secure SAP Ecosystem
F5 Delivers New Solutions That Radically Simplify Security For Every App And API

F5 Delivers New Solutions That Radically Simplify Security For Every App And API

F5 Distributed Cloud Services Web Application Scanning automates security reconnaissance and penetration testing for web applications. BIG-IP Next WAF mitigates web app and API threats while increasing operational efficiency for NetOps and SecOps teams. NGINX App Protect extends web app firewall protections for NGINX open source deployments to ...
Ping Identity Survey Reveals Urgent Need Among Australian Enterprises for Advanced Identity Protection in AI Era

Ping Identity Survey Reveals Urgent Need Among Australian Enterprises for Advanced Identity Protection in AI Era

Sydney, 1 May 2024 -- Ping Identity, a leading provider of seamless and secure digital experiences, today released the findings of its new survey, shedding light on the state of identity fraud prevention in today’s AI-driven digital world. The report, based on responses from 100 Australian IT decision makers and an additional 600 IT decision-makers ...
Sekuro Announces New Partnership With Dragos To Strengthen OT Capabilities

Sekuro Announces New Partnership With Dragos To Strengthen OT Capabilities

Rising attacks against Australian critical infrastructure drive demand for OT security
Infoblox Threat Intel Discovers Muddling Meerkat, a DNS Operation Controlling China’s Great Firewall

Infoblox Threat Intel Discovers Muddling Meerkat, a DNS Operation Controlling China’s Great Firewall

Infoblox Inc., a leader in cloud networking and security services, today announced that its threat intel researchers, in collaboration with external researchers, have uncovered ‘Muddling Meerkat’, a likely People's Republic of China (PRC) state actor with the ability to control the Great Firewall (GFW) of China, a system that censors and manipulates ...
Proofpoint: 59% of ASX 200 Companies at Risk of Email Fraud

Proofpoint: 59% of ASX 200 Companies at Risk of Email Fraud

Australian organisations lag behind global counterparts in basic email protection, Proofpoint analysis reveals
The Australian Organisations Looking to Generative AI to Boost Security Operations

The Australian Organisations Looking to Generative AI to Boost Security Operations

AustralianSuper, Powerlink Queensland and TAL among the first organisations exploring Microsoft’s Copilot for Security to enhance defence capabilities

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This