The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Weaving Sustainability into the DNA of How Companies Operate
82% of executives want to see an improvement in the sustainability of their workplaces, but the big question is how do businesses embed sustainability in their organisations in a lasting way that meets the expectations of executives and stakeholders? BT's Global Head of Sustainability, Sarwar Khan, discusses the three key focus areas companies need to ...
How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth
Australiaโs business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency, and success, it simultaneously empowers malicious threat actors to evolve and make more ...
Enhancing And Democratising DevSecOps With Generative AI And ClickOps
While still nascent, generative AI and no-code ClickOps solutions show immense promise for augmenting and spreading DevSecOps capabilities more widely in 2024, enabling enhanced delivery, and scalability across critical systems.
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day
Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
Chinaโs Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage
Why the PRC Fails to Back Its Claims of Western Espionage:
China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about Chinaโs irresponsible behavior in cyberspace.
Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles
With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% โย a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
In The News
APAC Organisations Increase Adoption of AI/ML Solutions to Address Wide Range of API Security Challenges
Latest research shows security misconfiguration as top concern in A/NZ.
A/NZ organisations are mitigating security misconfiguration and authorisation issues with AI/ML and API gateways
Genetec Announces Australian Data Centre For Security Center SaaS Hosted By Microsoft Azure
Company to meet regionโs growing demand for locally hosted cloud-based physical security technology
SYDNEY โ August 20, 2024 โ Genetec Inc. (โGenetecโ), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced that Genetecโข Security Center SaaS will be hosted in Australia on the ...
Post-Quantum Cryptography Algorithms: Thales Warns Organisations That The Transition To PQC Requires Careful Preparation
ThaPost Quantum Cryptography (PQR) is soon going to put an end to the encryption foundations we have relied upon for decades, forcing organisations to completely rethink how they approach digital security.
There's been one more step in this post-quantum world becoming a reality earlier this week, with the National Institute of Standards and ...
Beyond the wail: deconstructing the BANSHEE infostealer
The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.
Sophos Launches Dedicated Customer Success Team, Deepening Commitment to Customers and Channel Partners
Sophos is expanding its commitment to customers and channel partners with the launch of Sophos Customer Success. The new program features a team of experts who support customers throughout their post-sales experience with ongoing security resources and alerts, webinars and other educational information about cyberattacks, such as ransomware and data ...
Unit 42 Research Report Exposes Evolving Cybersecurity Risks Across Critical Industries
New insight reveals increasing complexity and exposure in attack surfaces driven by AI-generated threats
Palo Alto Networks, the global cybersecurity leader, today released its latest report, โ2024 Unit 42 Attack Surface Threat Reportโ, revealing the rapidly evolving landscape of cybersecurity threats. The study, drawn from several petabytes of data ...
Vista Group Boosts Cloud Operations and Secures IT Infrastructure with Support From ManageEngine
New-Zealand-founded Vista Group, a leading global provider of software and technology solutions across the film industry, obtainsย seamless resource management across multiple environments, proactive issue resolution, and assured compliance with help from ManageEngine.
Founded in 1996, Vista Group started when founder Murray Holdaway was tasked by a ...
Tenable Names Cloud Security Expert, Shai Morag, Chief Product Officer
Tenableยฎ, the exposure management company, today announced that it has named Shai Morag to the role of chief product officer. Morag will focus on delivering increased momentum and scale across Tenableโs entire portfolio, driving the companyโs next era of growth by building security products for a cloud-first world.
Morag joined Tenable in 2023 ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..