The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Hipster, Hacker & Hustler, meet Handler
Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.
5 Reasons Why You Shouldn’t Just Build the Solution
For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
From fluff to facts: how you can measure innovation
Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers
Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train
When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?
Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds
Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
In The News
BeyondTrust’s Annual Microsoft Vulnerabilities Report Finds Vulnerability Numbers Remain High with Elevation of Privilege Remaining the #1 Vulnerability Category
Elevation of Privilege is the top vulnerability category for the fourth year running, accounting for 40% of all Microsoft vulnerabilities in 2023
Total vulnerabilities maintain 4-year holding pattern near record highs
Atlanta, GA – April 22, 2024 – BeyondTrust, the worldwide leader in intelligent identity and access security, today announced the ...
Employers Mutual Limited Insures Risk Management with SentinelOne®
SYDNEY, April 23, 2024 - As an insurer, Employers Mutual Limited (EML) knows a few things about risk. The injury management specialist selected SentinelOne (NYSE: S), a global leader in AI-powered security, as its platform to mitigate it.
“Security is a huge driver for our business,” said Hayden MacKellar, Information and Security Risk Manager, EML. ...
Macquarie Government Selected for Australian Defence Procurement Panel
Macquarie Government today announced it has been added to the Information Communications Technology Provider Arrangement (ICTPA) panel. This will enable the Australian Defence Force to procure services directly from Macquarie Government.
Established in 2018 to replace the Applications Managed Service Partner Agreement (AMSPA), the ICTPA has been ...
Tecala to Strengthen Customer Email Security Defences with Check Point Software Technologies Partnership
Sydney, 22 April 2024 - Leading technology service provider Tecala Group has announced that it has been appointed a Check Point Software Technologies partner in Australia with a focus on reinforcing customers’ email cybersecurity posture and providing comprehensive cybersecurity solutions that not only protect against known threats but also anticipate ...
Fortinet Named a Challenger in the 2024 Gartner® Magic Quadrant™ for Security Service Edge
Fortinet recognised in eight Gartner® Magic Quadrant™ reports, based on the Fortinet Security Fabric Platform
Cisco Reimagines Security for Data Centres and Clouds in Era of AI
Cisco Hypershield Brings Power of Hyperscaler Security and Connectivity to the Enterprise
BeyondTrust Announces 2024 APJ Partner Experience Award Winners
Sydney – 18 April 2024 - BeyondTrust, the leader in intelligent identity and access security, today announced the winners of its APJ Partner Experience Awards for those companies which have gone above and beyond in their commitment to meeting customer identity and access security needs this past year.
The BeyondTrust Partner Experience Awards ...
Qualys Launches Free Service to Help Organisations De-Risk their Business to Align with UK NCSC Guidelines
Qualys’ new service empowers organisations to access personalised risk perspectives and remediation plans, aligning with NCSC's 5-day risk mitigation timeline
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..