The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability.ย Itโ€™s a โ€˜double-edged swordโ€™ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
Australia’s New Defence Technology Law: A Strategic Move or a Threat to Global Collaboration?

Australia’s New Defence Technology Law: A Strategic Move or a Threat to Global Collaboration?

Australia is poised to enact a new law that imposes stringent regulations on sharing defence technology with foreign entities, with the notable exception of its AUKUS partners, Britain and the United States. This significant move is designed to align with U.S. export controls on defence technology, a critical component of the AUKUS plan to construct ...
Insights from Cisco Live: Whatโ€™s Cooking?

Insights from Cisco Live: Whatโ€™s Cooking?

The recent Cisco Live event in Melbourne 2023, provided a platform for industry leaders to discuss the critical cybersecurity challenges facing our industry. The noted event included prominent figures from Cisco and other industry experts, shedding light on the complexities, innovations, and pressing issues within the cybersecurity sphere. A ...
Communication Is Key to IT Security

Communication Is Key to IT Security

The growing scope and severity of cyber threats targeting Australian businesses this past year has put a spotlight on the need for greater security measures. With more attention and support, now is the time for companies of all sizes to bolster their preparedness against emerging threats โ€“ and opening up internal dialogues across the business will be ...
Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Partnerships play a vital role in meeting customer demands and driving success for organisations. In a recent episode of the KBKast podcast, host Karissa Breen sat down with Raj Sharma, from Palo Alto Networks, to discuss the importance of strategic partnerships and the changing dynamics of the reseller ecosystem. From the rise of direct ...
The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most cyber secure nation by 2030. However, according to Apple, Australia is one of the top four countries for cyber-attacks - behind the US, the UK and Canada. With the government playing an increasingly proactive, and prominent role in ...
Robust Physical Security Includes Strong Data Privacyย 

Robust Physical Security Includes Strong Data Privacyย 

Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue technologies, towards modern digital infrastructure. At the same time, governments and citizens have become increasingly concerned about privacy implications.

In The News

SentinelOneยฎ Continues to Redefine End-to-End Security with Singularityโ„ข Platform

SentinelOneยฎ Continues to Redefine End-to-End Security with Singularityโ„ข Platform

Major new advancements delivered on secure-by-design, unified agent unleash power of industry-leading AI-security technology, turbocharging protection across every endpoint, identity and cloud workload LAS VEGAS, NV - August 5, 2024 - SentinelOne ย (NYSE: S), a global leader in AI-powered security,ย  today announced a series of groundbreaking ...
Arctic Wolf Expands Cyber JumpStart Portal Program to Help Business Leaders Fast-track Their Security Journey and Improve Insurability At No Cost

Arctic Wolf Expands Cyber JumpStart Portal Program to Help Business Leaders Fast-track Their Security Journey and Improve Insurability At No Cost

With the support of its global insurance community, Arctic Wolf opens Cyber JumpStart program directly to businesses to manage cyber risk and advance insurability and business resilience
Newgen Recognized in an Analyst Report on Task-Centric Automation Software Landscape

Newgen Recognized in an Analyst Report on Task-Centric Automation Software Landscape

Newgen Software, a global provider of a unified low-code platform, announced that it has been acknowledged in Forrester's report, The Task-Centric Automation Software Landscape, Q3 2024, among notable vendors.
The National Vulnerability Database (NVD) Crisis: Defend Against Unpatched Vulnerabilities

The National Vulnerability Database (NVD) Crisis: Defend Against Unpatched Vulnerabilities

Update on the National Vulnerability Database (NVD) Crisis and urgent need for virtual patching alternatives to cover the gap
Qualys Advances Enterprise TruRisk Platform to De-Risk Generative AI and LLM Usage from Security and Compliance Challenges

Qualys Advances Enterprise TruRisk Platform to De-Risk Generative AI and LLM Usage from Security and Compliance Challenges

New solution, Qualys TotalAI, enables holistic discovery and vulnerability assessment of AI workloads to detect data leaks, injection issues and model theft Qualys, Inc. (NASDAQ: QLYS), a leading provider of disruptive cloud-based IT, security and compliance solutions announced it is expanding its portfolio with Qualys TotalAI, designed to address ...
Rapid7 Launches the Command Platform, A Unified Attack Defense and Response Platform That Provides Better Visibility Across The Attack Surface

Rapid7 Launches the Command Platform, A Unified Attack Defense and Response Platform That Provides Better Visibility Across The Attack Surface

Rapid7 Command Platform provides a unified threat exposure, detection, and response platform so customers can integrate their critical security data to provide a unified view of vulnerabilities, exposures, and threats from endpoint to cloud to close security gaps and prevent attacks.
Tenable Unveils Industry Leading Vulnerability Intelligence Data and Response Capabilities to Expose and Close Priority Threats that Drive Up Risk

Tenable Unveils Industry Leading Vulnerability Intelligence Data and Response Capabilities to Expose and Close Priority Threats that Drive Up Risk

First-of-their-kind Vulnerability Intelligence and Exposure Response features deliver actionable intelligence across IT and cloud environments
BITS and Bytes: Analysing BITSLOTH, a newly identifiedย backdoor

BITS and Bytes: Analysing BITSLOTH, a newly identifiedย backdoor

Elastic Security Labs identified a novel Windows backdoor leveraging the Background Intelligent Transfer Service (BITS) for C2. This malware was found during a recent activity group tracked as REF8747.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This