The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Artificial Intelligence in Academia

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia

The Glimpse at the Future of Software Academia

Software is key to a computersโ€™ functionality and in fact, a system canโ€™t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has itsโ€™ origins in ...
‘Captivity Clouds’ โ€“ A Trap For Modern Day Security Leaders

‘Captivity Clouds’ โ€“ A Trap For Modern Day Security Leaders

Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily ...
Prioritise Foundational Cloud Security Before Leveraging Generative AI

Prioritise Foundational Cloud Security Before Leveraging Generative AI

An article around how to prioritise foundational cloud security before leveraging Generative AI.
How Data Quality Is Limiting Your Organisation’s AI Success

How Data Quality Is Limiting Your Organisation’s AI Success

Too often, having strong data processes can be seen as a โ€˜nice to haveโ€™. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more than that. Weโ€™re now living in a world where holding onto too much data could get you ...
Cybersecurity Budgets and Readiness – Are we there yet?

Cybersecurity Budgets and Readiness – Are we there yet?

In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver ...
The Role Of Regulatory Bodies In Safeguarding People From Artificial Intelligence

The Role Of Regulatory Bodies In Safeguarding People From Artificial Intelligence

Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business operations. This focus is driven by a concern for consumer protection, particularly the safety and security of personally identifiable information (PII) and the potential for ...
Business Risk Observability Is Vital For IT Teams To Come Together And Mitigate Security Risks Within Modern Applications

Business Risk Observability Is Vital For IT Teams To Come Together And Mitigate Security Risks Within Modern Applications

For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate separately from development and operations teams. Security has traditionally been seen as a reactive function within the IT department, there to resolve security breaches and patch up ...

In The News

Launches New Machine Identity Security Product To Help Simplify Management, Security, And Lifecycle Of Machine Identities For Enterprises

Launches New Machine Identity Security Product To Help Simplify Management, Security, And Lifecycle Of Machine Identities For Enterprises

SailPoint is expanding beyond human identity governance into the rapidly growing field of machine identities, addressing a critical gap for enterprises
Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks

Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks

Privileged Task Automation revolutionises the way organisations manage the execution of tasks that require privileged access
New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour

New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour

The findings demonstrate a strong correlation between full-stack observability and reduced downtime, fewer interruptions, and lower annual outage costsโ€”reinforcing the critical role observability plays in maximising operational efficiencies and business performance.
Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source ...
AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

With sales beginning as early as October and extending through late December, Imperva warns that the holiday shopping season represents a critical time for online retailers. AI-driven attacks originate from AI tools like ChatGPT, Claude, and Gemini, alongside specialised bots that are designed to scrape websites for LLM (Large Language Model) training data.
Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave, a global leader in cybersecurity and managed security services, has announced an expanded partnership with Dicker Data, Australiaโ€™s premier IT distributor, which has long been a Trustwave solutions distributor. Dicker Data will now offer the entire portfolio of Trustwaveโ€™s cutting-edge cybersecurity services to its resellers as part of this ...
Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organisations Worldwide

Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organisations Worldwide

Sophos today announced a definitive agreement for Sophos to acquire Secureworks. The all-cash transaction is valued at approximately $859 million. Sophos is backed by Thoma Bravo, a leading software investment firm. Sophosโ€™ experience and reputation as a leading provider of managed security services and end-to-end security products, combined with ...
Camelot Secure Wins APT Solution Provider of the Year, Leading the Charge in Proactive Cybersecurity Defense

Camelot Secure Wins APT Solution Provider of the Year, Leading the Charge in Proactive Cybersecurity Defense

Camelotโ€™s Advanced Persistent Threat (APT) Hunt Service offers organizations a means to proactively identify potential threats through advanced technological innovations before they can inflict harm. This approach represents a significant departure from traditional cybersecurity practices, shifting towards a more offensive, proactive strategy in ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This