The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.  Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.  This event was hosted ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you from becoming a victim. High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. In the following article, we will showcase a range of real-world phishing ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

We already know that phishing is a significant threat to businesses and individuals. Anti-phishing tips, such as “always hover over the link in an email before clicking” or “be wary of emails with poor grammar”, are meant to help us avoid being tricked by phishing emails. These tips have been circulating on the internet for over a decade, but sadly, ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
Hipster, Hacker & Hustler, meet Handler

Hipster, Hacker & Hustler, meet Handler

Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.
5 Reasons Why You Shouldn’t Just Build the Solution

5 Reasons Why You Shouldn’t Just Build the Solution

For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.

In The News

SAP Security Response Names SecurityBridge’s Research Lab As Top-3 Worldwide; Joris Van De Vis Appointed Lab’s Director

SAP Security Response Names SecurityBridge’s Research Lab As Top-3 Worldwide; Joris Van De Vis Appointed Lab’s Director

New York, NY, January 23, 2024 – SecurityBridge, a leading global provider of SAP security solutions, today announced the SAP Security Response Team has rated the SecurityBridge Research Lab among the Top-3 sources for discovering and reporting vulnerabilities in SAP software. The research lab has found and reported over 100 zero-day vulnerabilities ...
58% Of Australian Businesses Increase It Security Spending, With A Third Facing Ransomware Attacks In 2023

58% Of Australian Businesses Increase It Security Spending, With A Third Facing Ransomware Attacks In 2023

A recent survey by leading software research site Capterra reveals that Australian businesses are more actively improving their cybersecurity infrastructure to defend against potential attacks. The study's findings show that a third (33%) of the respondents have experienced security breaches in 2023 amidst recent notable data breaches occurring at ...
Teamviewer Unveils Real-Time Assistance App For Apple Vision Pro

Teamviewer Unveils Real-Time Assistance App For Apple Vision Pro

TeamViewer Spatial Support helps remote users interact with lifelike 3D models and collaborate in real time
Qualys Cybersecurity Asset Management Expands to Detect Unauthorised Devices Across Hybrid Environments

Qualys Cybersecurity Asset Management Expands to Detect Unauthorised Devices Across Hybrid Environments

Groundbreaking functionality enables millions of cloud agents to discover risky unmanaged devices in real time with one click
Check Point Software Unveils Infinity AI Copilot: Transforming Cybersecurity with Intelligent GenAI Automation and Support

Check Point Software Unveils Infinity AI Copilot: Transforming Cybersecurity with Intelligent GenAI Automation and Support

Check Point's latest innovation, brings AI-powered efficiency and collaboration to cyber security management across platforms
SentinelOne® Launches Threat Hunting for WatchTower™ and WatchTower Pro™

SentinelOne® Launches Threat Hunting for WatchTower™ and WatchTower Pro™

New machine learning and advanced behavioural threat hunting capabilities in managed threat hunting services empower security teams to defend against threats in real time.
Extreme Networks Introduces New Cloud-Managed Universal Wi-Fi 7 Access Point, Industry’s Easiest to Deploy/Provision Switches

Extreme Networks Introduces New Cloud-Managed Universal Wi-Fi 7 Access Point, Industry’s Easiest to Deploy/Provision Switches

Extreme Networks has announced two new solutions designed to help highly distributed enterprise organisations create improved network connectivity, security and application performance: the AP5020, Extreme’s first Wi-Fi 7 access point, and the 4000 Series cloud-managed switches.
SolarWinds Names Brian Goldfarb Chief Marketing Officer

SolarWinds Names Brian Goldfarb Chief Marketing Officer

Former Marketing Executive at Tenable, Splunk, and Google to Oversee Global Marketing Efforts of World-Class Observability, Database, and Service Management Solution Provider

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This