The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity
The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT
The term โcritical infrastructureโ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers โ particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets
INTRODUCTION
While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, weโre referring to data.
By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa
The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australiaโs finance sector needs
Information security is a journey, but calls of, โAre we there yet?โ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within
Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.
DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC
IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.
Four steps organisations can take to improve cybersecurity awareness
October is Cybersecurity Awareness Month, and thereโs no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).
In The News
Tesserent Recognised As A Microsoft Solution Partner In Security, Azure Infrastructure And Modern Work
Tesserentย Cyber Solutions by Thales Australia has been recognised as a key Microsoft Solution Partner in security, Azure infrastructure and modern work.ย ย
APAC Organisations Increase Adoption of AI/ML Solutions to Address Wide Range of API Security Challenges
Latest research shows security misconfiguration as top concern in A/NZ.
A/NZ organisations are mitigating security misconfiguration and authorisation issues with AI/ML and API gateways
Genetec Announces Australian Data Centre For Security Center SaaS Hosted By Microsoft Azure
Company to meet regionโs growing demand for locally hosted cloud-based physical security technology
SYDNEY โ August 20, 2024 โ Genetec Inc. (โGenetecโ), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced that Genetecโข Security Center SaaS will be hosted in Australia on the ...
Post-Quantum Cryptography Algorithms: Thales Warns Organisations That The Transition To PQC Requires Careful Preparation
ThaPost Quantum Cryptography (PQR) is soon going to put an end to the encryption foundations we have relied upon for decades, forcing organisations to completely rethink how they approach digital security.
There's been one more step in this post-quantum world becoming a reality earlier this week, with the National Institute of Standards and ...
Beyond the wail: deconstructing the BANSHEE infostealer
The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.
Sophos Launches Dedicated Customer Success Team, Deepening Commitment to Customers and Channel Partners
Sophos is expanding its commitment to customers and channel partners with the launch of Sophos Customer Success. The new program features a team of experts who support customers throughout their post-sales experience with ongoing security resources and alerts, webinars and other educational information about cyberattacks, such as ransomware and data ...
Unit 42 Research Report Exposes Evolving Cybersecurity Risks Across Critical Industries
New insight reveals increasing complexity and exposure in attack surfaces driven by AI-generated threats
Palo Alto Networks, the global cybersecurity leader, today released its latest report, โ2024 Unit 42 Attack Surface Threat Reportโ, revealing the rapidly evolving landscape of cybersecurity threats. The study, drawn from several petabytes of data ...
Vista Group Boosts Cloud Operations and Secures IT Infrastructure with Support From ManageEngine
New-Zealand-founded Vista Group, a leading global provider of software and technology solutions across the film industry, obtainsย seamless resource management across multiple environments, proactive issue resolution, and assured compliance with help from ManageEngine.
Founded in 1996, Vista Group started when founder Murray Holdaway was tasked by a ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..