The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Womenโs Day
Heidi Mejia, Client Executive, Tesserent
Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024
Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture
This article explores AIโs role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure
Another new kind of phishing attack is on the rise and itโs coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trustโtrust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams
As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust
Introduction
Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a companyโs reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
In The News
Cloudflare Helps Secure the Worldโs Most Popular Messaging Applications
Cloudflare and WhatsApp partner to pioneer a third-party security audit on Key Transparency technology
Emerson and Nozomi Networks Extend Relationship to Help Secure Critical Power and Water Processes Worldwide
Nozomi Networks has expanded its partnership with Emerson to cover its industry leading Ovation Automation platform to address the growing demand for operational cybersecurity services in the power and water industries. โEmerson is enhancing our power and water customersโ immediate access to OT network visibility, security and asset intelligence with ...
ManageEngine Rolls Out First-Ever Decision Intelligence Platform for Enhanced IT Operations
Company's Flagship IT Analytics Solution Introduces Spotlight for Intelligent, Data-Driven Strategic Recommendations
GitHub Offers Data Residency in the EU with GitHub Enterprise Cloud
Starting with the EU on October 29, GitHub, the most widely adopted Copilot-powered developer platform, will offer organizations more control over where their code is stored.
NetApp Makes Data More Resilient With Secure Storage
New capabilities for protecting data cement NetAppโs position as the most secure storage on the planet
F5 And NetApp Accelerate And Streamline Large Language Model AI Deployments
Collaboration bolsters generative AI capabilities with advanced data management and secure multicloud networking services for RAG integration
SYDNEY, AUSTRALIA โ SEPTEMBER 25, 2024 โ F5 (NASDAQ: FFIV) and NetApp (NASDAQ: NTAP) today announced an expanded collaboration to accelerate and streamline enterprise AI capabilities using secure multicloud ...
Despite Increasing Cybersecurity Attacks, People Still Believe Antiquated Username And Passwords Are Strong Enough
Results from a new study by Yubico show the need for education and taking a more holistic approach to cybersecurity at both work and home
Forescout Announces New SaaS Operational Technologies Solution
Forescout Technologies has announcedโฏits new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organisations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid.
Forescout for OT Security combines:
...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..