The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and itโ€™s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trustโ€”trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a companyโ€™s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

โ€˜Digital companionshipโ€™ has transcended science fiction. Itโ€™s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what weโ€™re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting โ€“ meaning ...
How Organisations Can Combat the Surge in Phishing Attacks

How Organisations Can Combat the Surge in Phishing Attacks

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australiansโ€™ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...
Why Human-Based and Identity Security is Becoming Increasingly Important

Why Human-Based and Identity Security is Becoming Increasingly Important

By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.

In The News

Patch Tuesday Commentray from Tenable

Patch Tuesday Commentray from Tenable

This month, Microsoft addresses 117 CVEs with three rated as critical and four zero-day vulnerabilities, two of which were exploited in the wild. Remote code execution (RCE) vulnerabilities accounted for 35.9% of the vulnerabilities patched this month, followed by elevation of privilege (EOP) vulnerabilities at 23.9%. Please find below a comment from ...
Cythera Achieves ISO 27001 Security Certification And Invests In MDR Services

Cythera Achieves ISO 27001 Security Certification And Invests In MDR Services

Melbourne, 9 October 2024 - Cythera, a leading Australian cybersecurity service provider, today announced it has achieved ISO 27001 certification, demonstrating its commitment to the highest standards of information security management. The company also revealed significant enhancements to its Managed Detection and Response (MDR) service, offering ...
NinjaOne Appoints Joel Carusone To SVP Of Data And AI And Introduces NinjaOne AI For Patch Sentiment

NinjaOne Appoints Joel Carusone To SVP Of Data And AI And Introduces NinjaOne AI For Patch Sentiment

NinjaOne has announced NinjaOne AI for Patch Sentiment, a new artificial intelligence (AI) feature that makes customers more efficient and resilient. The company also announced the appointment of Joel Carusone to Senior Vice President of Data and AI. Carusone will drive innovation and lead NinjaOneโ€™s AI product development. Endpoint growth is ...
AI-Powered Data Breaches A Growing Concern For Businesses In Asia Pacific

AI-Powered Data Breaches A Growing Concern For Businesses In Asia Pacific

New Cloudflare survey reveals 87% of cybersecurity leaders are concerned about AI increasing the sophistication and severity of data breaches Sydney, Australia, October 8, 2024ย โ€”ย Cloudflare, Inc.ย (NYSE: NET), the leading connectivity cloud company, today released a new study focused on cybersecurity in Asia Pacific. The report, called โ€œNavigating the ...
New CrowdStrike Partnerships Accelerate Adoption Of Industry-Leading Falcon Threat Intelligence

New CrowdStrike Partnerships Accelerate Adoption Of Industry-Leading Falcon Threat Intelligence

AUSTIN, Texas โ€“ October 8, 2024 โ€”ย CrowdStrikeย (NASDAQ: CRWD) today announced new strategic partnerships with CardinalOps, Nagomi Security and Veriti to deliver intelligence-led threat defense across the enterprise. Intelligence-led decision making is crucial to effective cybersecurity. With security teams often using a wide range of solutionsโ€”each ...
Tenable Research Finds 74% of Organisations Have Publicly Exposed Storage Assets, Increasing Risk of Ransomware Attacks

Tenable Research Finds 74% of Organisations Have Publicly Exposed Storage Assets, Increasing Risk of Ransomware Attacks

Theย Tenable Cloud Risk Report 2024, published today, reveals that a staggering 74% of organisations have publicly exposed storage assets, including those containing sensitive data, making them vulnerable to ransomware attacks. This exposure is often caused by unnecessary or excessive permissions, granting wider access to cloud-stored information than ...
From AustCyber to ACN: A New Era of Cyber Security Collaboration and Innovation for Australia

From AustCyber to ACN: A New Era of Cyber Security Collaboration and Innovation for Australia

Canberra, 9 October 2024ย โ€“ Over 94,000 cybercrime incidents were reported in Australia last financial year. Equivalent to one every six minutes and with the Australian Signals Directorate contacting businesses 620 times during this period to warn of potential threats, can you believe 280 of those calls went unanswered. Something needs to change in ...
Tecala Announces Security Operations Partnership with Arctic Wolf in Australia

Tecala Announces Security Operations Partnership with Arctic Wolf in Australia

Security Operations Leader Arctic Wolf will Provide Tecala Customers Industry-Leading Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This