The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

People Are An Essential Element In Your Cybersecurity Incident Response Plan

People Are An Essential Element In Your Cybersecurity Incident Response Plan

Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...
Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk.ย  However, many ...
Ransomware Attacks: No Sector is Safe

Ransomware Attacks: No Sector is Safe

Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...
Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Introduction In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...
Australia Sanctions Russian Hacker

Australia Sanctions Russian Hacker

Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
AI for Cybersecurity: Use With Caution

AI for Cybersecurity: Use With Caution

This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Weโ€™ve all heard the mantra that โ€˜humans are the weakest linkโ€™ in any organisationโ€™s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, itโ€™s no longer fair โ€” or effective โ€” to blame individuals for succumbing to attacks. Itโ€™s Andrewโ€™s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.

In The News

Fortinet Delivers Unmatched Flexibility And Simplicity With New Enhancements To Its Unified SASE Solution

Fortinet Delivers Unmatched Flexibility And Simplicity With New Enhancements To Its Unified SASE Solution

New sovereign secure access service edge (SASE) offering and intelligent generative artificial intelligence (AI) integration showcase companyโ€™s commitment to SASE innovationย  John Maddison, chief marketing officer, Fortinet, said, โ€œMany vendors today are packaging up fragmented SASE capabilities and calling it โ€˜unified SASEโ€™. Fortinet is the only ...
Jamie Norton Appointed To ISACA Board Of Directors

Jamie Norton Appointed To ISACA Board Of Directors

Sydney, Australia: ISACA, a leading global association for IT governance, risk management, and cybersecurity professionals, is pleased to announce the appointment of Australian cybersecurity veteran, Jamie Norton to its 2024-2025 Board of Directors. With over 25 years of experience in cybersecurity, risk management and governance, Jamie's expertise ...
NinjaOne Joins AWS Partner Network, Making It Easier For Organisations To Automate Endpoint Management

NinjaOne Joins AWS Partner Network, Making It Easier For Organisations To Automate Endpoint Management

NinjaOne announced it has joined the Amazon Web Services (AWS) Partner Network (APN), a global community of AWS Partners that leverage programs, expertise, and resources to build, market, and sell customer offerings. Joining APN makes it easier than ever for AWS customers to access the NinjaOne Platformโ„ข, training, curated programs, and resources โ€“ ...
Elasticsearch Open Inference API Now Supports Anthropicโ€™s Claude

Elasticsearch Open Inference API Now Supports Anthropicโ€™s Claude

The new integration makes it easier for developers to access Claude models directly from their Anthropic account

Tenable Research Discovers Critical Vulnerability in Microsoft Copilot Studio

Tenable โ€” the exposure management company, has disclosed that its Tenable Research Team has discovered a critical information disclosure vulnerability in Microsoftโ€™s Copilot Studio via a server-side request forgery (SSRF), which allowed researchers access to potentially sensitive information regarding service internals with potential cross-tenant ...
Elastic Recognised as a Leader in 2024 Gartnerยฎ Magic QuadrantTM for Observability Platforms

Elastic Recognised as a Leader in 2024 Gartnerยฎ Magic QuadrantTM for Observability Platforms

Recognised for Completeness of Vision and Ability to Execute
Elastic Expedites SecOps Tasks with LangChain

Elastic Expedites SecOps Tasks with LangChain

The combined technologies bring AI-driven security innovations to SOC teams
Veeam Ranked #1 In The 2024 Gartnerยฎ Market Share Analysis For Enterprise Backup And Recovery Software Report

Veeam Ranked #1 In The 2024 Gartnerยฎ Market Share Analysis For Enterprise Backup And Recovery Software Report

Veeam jumps to lead position worldwide as the need for data resilience accelerates

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This