The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and itโ€™s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trustโ€”trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a companyโ€™s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

โ€˜Digital companionshipโ€™ has transcended science fiction. Itโ€™s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what weโ€™re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting โ€“ meaning ...
How Organisations Can Combat the Surge in Phishing Attacks

How Organisations Can Combat the Surge in Phishing Attacks

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australiansโ€™ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...
Why Human-Based and Identity Security is Becoming Increasingly Important

Why Human-Based and Identity Security is Becoming Increasingly Important

By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.

In The News

Elasticsearch Open Inference API now Supports Google AI Studio

Elasticsearch Open Inference API now Supports Google AI Studio

Developers can now use Elasticsearch to interact with data, run experiments and build applications using models available from Google AI Studio
JFrog-Sponsored IDC Study Shows Growing Developer Focus on Software Security, Impacting Companiesโ€™ Competitive Advantage

JFrog-Sponsored IDC Study Shows Growing Developer Focus on Software Security, Impacting Companiesโ€™ Competitive Advantage

Titled the "Hidden Costs of DevSecOps," the IDC InfoBrief Reveals Companies Spend an Average of $28K Per Developer Annually on Identifying, Evaluating, and Addressing Software Security Concerns
Trend Micro Achieves Google Cloud Ready – Regulated & Sovereignty Solutions Designation

Trend Micro Achieves Google Cloud Ready – Regulated & Sovereignty Solutions Designation

Expanded collaboration to accelerate market growth and unleash new opportunities
SecurityBridgeโ€™s Bill Oliver Selected By ASUG Organizers To Discuss SAP Cybersecurity Best Practices

SecurityBridgeโ€™s Bill Oliver Selected By ASUG Organizers To Discuss SAP Cybersecurity Best Practices

Company Reveals Itโ€™s New โ€œCybersecurity Command Center for SAPโ€ Initiative at the Houston, TX, Event
Recorded Future Unveils AI-Driven Enhancements to Combat Ransomware Threats with Real-Time Intelligence

Recorded Future Unveils AI-Driven Enhancements to Combat Ransomware Threats with Real-Time Intelligence

AI-Powered Threat Intelligence Delivers Enhanced Visibility, Faster Detection, and Proactive Response Across the Entire Ransomware Lifecycle
Fortinet Expands Its Cloud-Native Security Offerings With The Introduction Of Lacework FortiCNAPP

Fortinet Expands Its Cloud-Native Security Offerings With The Introduction Of Lacework FortiCNAPP

Combining Laceworkโ€™s leading cloud-native application protection platform with the Fortinet Security Fabric delivers unmatched visibility and protection across multi-cloud environmentsย 
AusCERT Launches New Tabletop Exercise Service To Boost Incident Response Readiness

AusCERT Launches New Tabletop Exercise Service To Boost Incident Response Readiness

AUSCERT'S new TTX service enables organisations of all sizes to focus on critical aspects of cyber incident response, business continuity and crisis management and uplift capabilities.ย ย 
Tesserent Highlights Significant Pivot From NIST On Password Advice โ€“ Australian Businesses, Public Sector And Consumers Advised Not To Bother With Complex Passwords

Tesserent Highlights Significant Pivot From NIST On Password Advice โ€“ Australian Businesses, Public Sector And Consumers Advised Not To Bother With Complex Passwords

Tesserent highlights significant pivot from NIST on password advice โ€“ Australian businesses, public sector and consumers advised not to bother with complex passwords

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This