The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Over Half Of Privacy Pros โ€“ 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Over Half Of Privacy Pros โ€“ 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Jo Stewart-Rattray: โ€œIt is paramount that organisations understand what is expected of them in order to devise an effective privacy policy and implement accordingly. Then will they be able to realise the benefits of embedding privacy practices in digital transformation from the outset, including customer loyalty, reputational and financial performance.โ€
People Are An Essential Element In Your Cybersecurity Incident Response Plan

People Are An Essential Element In Your Cybersecurity Incident Response Plan

Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...
Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk.ย  However, many ...
Ransomware Attacks: No Sector is Safe

Ransomware Attacks: No Sector is Safe

Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...
Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Introduction In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...
Australia Sanctions Russian Hacker

Australia Sanctions Russian Hacker

Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
AI for Cybersecurity: Use With Caution

AI for Cybersecurity: Use With Caution

This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Weโ€™ve all heard the mantra that โ€˜humans are the weakest linkโ€™ in any organisationโ€™s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, itโ€™s no longer fair โ€” or effective โ€” to blame individuals for succumbing to attacks. Itโ€™s Andrewโ€™s view that while cyber training ...

In The News

OpenText Cybersecurityโ€™s 2024 Threat Hunter Perspective Shows Collaboration Between Nation-States and Cybercrime Rings to Inflict More Damage

OpenText Cybersecurityโ€™s 2024 Threat Hunter Perspective Shows Collaboration Between Nation-States and Cybercrime Rings to Inflict More Damage

Adversaries are taking advantage of weak security fundamentals and a lack of countermeasures to carry out cyberattacks
Newgen Recognized in The Content Platforms Landscape, 2024, by an Independent Research Firm

Newgen Recognized in The Content Platforms Landscape, 2024, by an Independent Research Firm

Newgen Software, a global provider of AI-enabled digital transformation platform, has been identified by Forrester among โ€˜Notable Vendorsโ€™ in โ€œThe Content Platforms Landscape, Q3 2024,โ€ report, authored by Cheryl McKinnon et al.
Global cybersecurity report highlights concerning attitudes among young Australians towards online security

Global cybersecurity report highlights concerning attitudes among young Australians towards online security

Today, the Australian Cyber Collaboration Centre (Aus3C) announced the release of the Annual Cybersecurity Attitudes and Behaviours Report (Oh Behave! 2024). The research reveals a pressing need to address growing concerns about attitudes towards online safety, with worrying trends particularly evident among younger Australians. Over 6,500 ...
Check Point Software Recognised as a Visionary in Endpoint Security in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms

Check Point Software Recognised as a Visionary in Endpoint Security in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms

Check Point is acknowledged for its ability to execute and completeness of vision
Veeam Announces A New Integration With Palo Alto Networks To Streamline Security Operations And Deliver Data Resilience For Customers

Veeam Announces A New Integration With Palo Alto Networks To Streamline Security Operations And Deliver Data Resilience For Customers

New Veeam Apps integrated with Palo Alto Networks Cortex platform help organisations identify and respond to cyberattacks faster, ensuring the resilience of business-critical backup dataย  SYDNEY โ€“ September 27, 2024 โ€“ Veeamยฎ Software, the #1 leader by market share in Data Resilience today announced a new integration with Palo Alto Networks, the global ...
Infoblox Unveils Game-Changing Universal DDI Product Suite To Help NetOps, SecOps, And CloudOps Work Better Together

Infoblox Unveils Game-Changing Universal DDI Product Suite To Help NetOps, SecOps, And CloudOps Work Better Together

Infoblox has unveiled its new Universal DDI Product Suiteโ€‹,โ€‹ which enables cohesive DDI management, comprehensive asset visibility, and proactive security by breaking down silos across NetOps, CloudOps, and SecOps while offering the added flexibility of adaptive deployment models. Infoblox is the only company to equip IT and business leaders with ...
Comment on Common UNIX Printing System (CUPS) Vulnerabilities

Comment on Common UNIX Printing System (CUPS) Vulnerabilities

Following a post on X from software developerย Simone Margaritelli, it was revealed that there areย a series of vulnerabilities in the Common UNIX Printing System (CUPS).ย Common UNIX Printing System (CUPS) is an open-source printing system for Linux and other UNIX-like operating systems. CUPS uses the IPP (Internet Printing Protocol) to allow for ...
CrowdStrike Named a Leader in Attack Surface Management by Independent Research Firm

CrowdStrike Named a Leader in Attack Surface Management by Independent Research Firm

CrowdStrike ranks highest of all vendors in Current Offering category and earns the highest possible score in Market Presence category

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This