The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Advancing Security and Resilience: Insights from AWS Summit in Sydney

Advancing Security and Resilience: Insights from AWS Summit in Sydney

At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia

Artificial Intelligence in Academia

AI - An Overview Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia

The Glimpse at the Future of Software Academia

Software is key to a computersโ€™ functionality and in fact, a system canโ€™t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1 From the late 1940s through the 1970s, the concept of software development has itsโ€™ origins in ...
‘Captivity Clouds’ โ€“ A Trap For Modern Day Security Leaders

‘Captivity Clouds’ โ€“ A Trap For Modern Day Security Leaders

Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily ...
Prioritise Foundational Cloud Security Before Leveraging Generative AI

Prioritise Foundational Cloud Security Before Leveraging Generative AI

An article around how to prioritise foundational cloud security before leveraging Generative AI.
How Data Quality Is Limiting Your Organisation’s AI Success

How Data Quality Is Limiting Your Organisation’s AI Success

Too often, having strong data processes can be seen as a โ€˜nice to haveโ€™. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more than that. Weโ€™re now living in a world where holding onto too much data could get you ...
Cybersecurity Budgets and Readiness – Are we there yet?

Cybersecurity Budgets and Readiness – Are we there yet?

In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver ...
The Role Of Regulatory Bodies In Safeguarding People From Artificial Intelligence

The Role Of Regulatory Bodies In Safeguarding People From Artificial Intelligence

Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business operations. This focus is driven by a concern for consumer protection, particularly the safety and security of personally identifiable information (PII) and the potential for ...

In The News

New OT Security Solutions From Palo Alto Networks Address Growing Cybersecurity Threats To Industrial Operations

New OT Security Solutions From Palo Alto Networks Address Growing Cybersecurity Threats To Industrial Operations

Powered by Precision AI, new capabilities protect OT remote operations, mitigate risk for critical OT assets and extend security into harsh industrial environments Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today introduced new capabilities in its OT Security solution, including the industryโ€™s only fully integrated, risk-based ...
UiPath Unveils Vision for the Future: Expanding the Boundaries of AI with Agentic Automation

UiPath Unveils Vision for the Future: Expanding the Boundaries of AI with Agentic Automation

UiPath (NYSE: PATH), a leading enterprise automation and AI software company, today announced its new vision and strategic direction centred on the next evolution of enterprise automation โ€“ agentic automation.
Launches New Machine Identity Security Product To Help Simplify Management, Security, And Lifecycle Of Machine Identities For Enterprises

Launches New Machine Identity Security Product To Help Simplify Management, Security, And Lifecycle Of Machine Identities For Enterprises

SailPoint is expanding beyond human identity governance into the rapidly growing field of machine identities, addressing a critical gap for enterprises
Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks

Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks

Privileged Task Automation revolutionises the way organisations manage the execution of tasks that require privileged access
New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour

New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour

The findings demonstrate a strong correlation between full-stack observability and reduced downtime, fewer interruptions, and lower annual outage costsโ€”reinforcing the critical role observability plays in maximising operational efficiencies and business performance.
Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software

Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source ...
AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season

With sales beginning as early as October and extending through late December, Imperva warns that the holiday shopping season represents a critical time for online retailers. AI-driven attacks originate from AI tools like ChatGPT, Claude, and Gemini, alongside specialised bots that are designed to scrape websites for LLM (Large Language Model) training data.
Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services

Trustwave, a global leader in cybersecurity and managed security services, has announced an expanded partnership with Dicker Data, Australiaโ€™s premier IT distributor, which has long been a Trustwave solutions distributor. Dicker Data will now offer the entire portfolio of Trustwaveโ€™s cutting-edge cybersecurity services to its resellers as part of this ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This