The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity
The article talks to the importance and urgency of Real-Time Cyber Asset Risk Reporting in todayโs threat landscape. It highlights Australian statistics, touching on increases in attack frequency, targeted industries, and the financial impact on Australian businesses, and how Australian business may be lagging behind in their defences, and touches on ...
Scams and The Critical Role for Australian Banks
Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission's report Australians lost AUD $2.74 billion to scams in 2023 - although this was a welcome decline compared to 2022 (AU$3.15 billion lost) it is still alarmingly ...
Sustainability in Business is More than a Reusable Coffee Cup
When people hear sustainability, some might straight away think - oh yes a reusable coffee cup. Perhaps, however in this context weโre talking about sustainability within tech businesses and what does this mean and more importantly - what does that look like?Luke Hargreaves, Founder and CEO from Aquainnis chatted to me about the urgent need for ...
How To Quickly Kick Start Holistic SAP Security
SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.
Exclusive: Zero Trust Security – The way Forward for IT and Security
In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on todayโs cyber market and predictions in regards to the future of cybersecurity. The crucial ...
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities
As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope
The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Pythonโs, PyPIโs and Python Software Foundationโs GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub.
As a community service, the JFrog Security Research team continuously scans public ...
In The News
Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub
Immediate access to the powerful, highly scalable AI/ML functions of ClearScape Analytics, in a serverless, on-demand compute engine that integrates natively with Fabric and OneLake
Tenable Comment on Annual Cyber Threat Report 2023-2024
The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or credentials. Please find further comments below from Satnam Narang, sr. staff research engineer, Tenable.
โThe Annual Cyber Threat Report from the ASDโs ACSC provides insights into ...
Yubico Announces Yubico Enrollment Suite for Microsoft users, a Turnkey Passwordless Onboarding Experience
November 20, 2024 โ Todayย Yubicoย (NASDAQ: YUBICO), the leading provider of hardware authentication security keys, announced the availability ofย Yubico Enrollment Suiteย for Microsoft users, includingย Yubico FIDO Pre-regย and the newย YubiEnroll. These solutions integrate with Microsoftโs Entra ID, helping organisations create stronger cyber resilience and ...
Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected
Organisations are reassessing their cybersecurity budget allocations after taking 5.9 months to recover from incidents in 2024 - over a month longer than expected
Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available
As the digital landscape grows increasingly interconnected, defenders face a critical challenge: the data and insights from various security tools are often siloed or, at best, loosely integrated. This fragmented approach makes it difficult to gain a holistic view of threats or assess their potential impact on critical assets. In a world where a single ...
Thales Expands CipherTrust Data Security Platform as-a-Service Offerings
CipherTrust Transparent Encryption helps organisations meet compliance mandates and protect data wherever it resides New Cloud Service includes Live Data Transformation for non-disruptive encryption and Ransomware Protection to monitor continuously for abnormal activity
Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector
On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, willย testifyย in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus ...
Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report
Genetec bolsters #2 global ranking with six consecutive years of organic growth
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..