The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Chinaโs Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage
Why the PRC Fails to Back Its Claims of Western Espionage:
China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about Chinaโs irresponsible behavior in cyberspace.
Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles
With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated
The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% โย a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery
The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star
Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue
Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth โThe Future of Cybersecurity in Asia Pacific and Japanโ report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
Compliance and Security: The AI-Powered Identity Revolution
The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities.
The challenge is most organisations havenโt yet implemented a comprehensive identity security strategy to help manage the access for hundreds to thousands of identities, with ...
In The News
Tenable Enhances Nessus Risk Prioritisation To Help Customers Expose And Close Exposures – Integration of EPSS Into Tenable Exposure Solutions Ensures Compliance And Accelerates Prioritisation Efforts
Tenableยฎ, the exposure management company, today announced new risk prioritisation and compliance features forย Tenable Nessus, the #1 vulnerability assessment solution in accuracy, coverage and adoption. Nessus supports new and updated vulnerability scoring systems โ Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System ...
ManageEngine to Host CyberCon Roadshow 2024 In Australia And New Zealand
ManageEngine will provide deep insights on cybersecurity trends and IT management solutions
Veeam Expands Worldโs #1 Data Resilience Solution For Microsoft 365
Already protecting 21 million Microsoft 365 users, Veeam Backup for Microsoft 365 v8 delivers comprehensive immutabilityย and enterprise-scale capabilities
Check Point Software Unveils New MSSP Portal For Partners: Vastly Simplifying Service Delivery And Ease Of Doing Business
Sydney, 4 September 2024 - Check Pointยฎ Software Technologies Ltd. (NASDAQ: CHKP), a leading cyber security platform provider of AI-powered, cloud delivered solutions, has unveiled its innovative Portal designed for both managed security service providers (MSSPs) and distributors. This platform significantly simplifies service delivery and enhances the ...
Perils In The Periphery – Forescout’s 2024 H1 Threat Review
Forescout published its โ2024H1 Threat Reviewโ. The new report reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023.
โAttackers are looking for any weak point to breach IT, IoT, and OT devices, and organisations that donโt know what they have connected to their ...
Fortinet Partners With Police Veterans Victoria To Offer Cybersecurity Training To Police Veterans
Fortinet reaffirms its commitment to train one million people in cybersecurity by 2026 through a first-of-its-kind partnership to equip Victoria Police veterans with essential cybersecurity skillsย
F5 Collaborates With Intel To Simplify The Security And Delivery Of AI Services
Enhancing the protection and performance of enterprise AI inference solutions with F5 NGINX Plus, Intel OpenVINO, and Intel IPUs
Elastic Announces Open Source License For Elasticsearch And Kibana Source Code
OSI-approved AGPL license will be added for a subset of Elasticsearch and Kibana source code
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..