The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.
The Future of VPNs? No Where.

The Future of VPNs? No Where.

Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on โ€˜Zero Trustโ€™. Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...
Predicting The Future – With Kavitha Mariappan

Predicting The Future – With Kavitha Mariappan

What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...
How to Protect Against the Rising Tide of Password Spray Attacks

How to Protect Against the Rising Tide of Password Spray Attacks

Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.
Australian Energy Sector Grappling with Rising Ransomware Threat

Australian Energy Sector Grappling with Rising Ransomware Threat

As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.
Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
How to Innovate in a Privacy-Protective Way

How to Innovate in a Privacy-Protective Way

Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.
Leading Cybersecurity Tech Trends Driving change

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.

In The News

QuintessenceLabs and Equinix Protect Organisations in the Quantum Era

QuintessenceLabs and Equinix Protect Organisations in the Quantum Era

QuintessenceLabs has deployed its Trusted Security Foundation key and policy manager appliance in Equinixโ€™s International Business Exchange data centre in Canberra to help organisations strengthen their defences against the cryptographic threats posed by quantum computing.
New Report from BlueVoyant Shows Progress in Third-Party Cyber Risk Management, But Breaches Persist

New Report from BlueVoyant Shows Progress in Third-Party Cyber Risk Management, But Breaches Persist

โ€œMore organisations than any previous year indicated that their primary focus is no longer on awareness of the third-party risk management problem or adoption of a program, but rather with the operational, day-to-day challenges of managing an effective program,โ€ said Joel Molinoff, global head of Supply Chain Defense at BlueVoyant.
Rimini Street Announces Expansion of its Database Security Solutions Providing Even More Extensive Security and Compliance Capabilities for Most Common Commercial and Open-Source Databases

Rimini Street Announces Expansion of its Database Security Solutions Providing Even More Extensive Security and Compliance Capabilities for Most Common Commercial and Open-Source Databases

Rimini Stree has announced new and expanded database security services and solutions to provide more tailored, flexible, and proactive coverage for all organisations, whether currently supported by the vendor or out of vendor support.
The Rise of AI-Driven Attacks, Quantum Threats, and Social Media Exploitation: A New Era of Emerging Technologies and Landscape for Cybercriminals in 2025

The Rise of AI-Driven Attacks, Quantum Threats, and Social Media Exploitation: A New Era of Emerging Technologies and Landscape for Cybercriminals in 2025

Check Point Software 2025 Cyber Security Predictions reveal how emerging technologies and advanced cyber criminal tactics will reshape the global threat landscape
Aussies Brace For A Record-Breaking Shopping Season With Scammers Set To Strike

Aussies Brace For A Record-Breaking Shopping Season With Scammers Set To Strike

With the holiday season just around the corner, Aussies are gearing up for the yearโ€™s biggest shopping spree, out to score great deals. Over the six-week lead up to Christmas, shoppers are expected to spend more than $69.7 billion โ€“ a significant part of it online, especially during Black Friday and Cyber Monday sales. This yearโ€™s Black Friday/Cyber ...
OpenText Cybersecurity Unveils 2024โ€™s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure

OpenText Cybersecurity Unveils 2024โ€™s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure

As cyberattacks grow more insidious, organisations are ramping up cybersecurity investments to defend essential services Sydney, Australia โ€“ 31st October 2024 โ€“ OpenText (NASDAQ: OTEX), (TSX: OTEX), has revealed its highly anticipated โ€œNastiest Malware of 2024โ€ list, spotlighting the yearโ€™s most notorious cyber threats. Now in its seventh year, ...
Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellenceย 

Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellenceย 

Qualys, a leading provider of disruptive cloud-based IT, security and compliance solutions, today announced that its multi-tenant Qualys Cloud Platform was successfully assessed at the โ€˜PROTECTEDโ€™ level by the Infosec Registered Assessors Program (IRAP), an initiative by the Australian Signals Directorate (ASD). This achievement demonstrates that ...
Hunter Versus Spy: Sophos โ€œPacific Rimโ€ Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China

Hunter Versus Spy: Sophos โ€œPacific Rimโ€ Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China

Sophos recently released โ€œPacific Rim,โ€ a report detailing its defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. The attackers used a series of campaigns with novel exploits and customised malware to embed tools to ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This