The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term โ€˜critical infrastructureโ€™ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers โ€“ particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, weโ€™re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australiaโ€™s finance sector needs

PAM may be the infosec pressure relief valve Australiaโ€™s finance sector needs

Information security is a journey, but calls of, โ€˜Are we there yet?โ€™ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.
DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.
Four steps organisations can take to improve cybersecurity awareness

Four steps organisations can take to improve cybersecurity awareness

October is Cybersecurity Awareness Month, and thereโ€™s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).

In The News

Tesserent Recognised As A Microsoft Solution Partner In Security, Azure Infrastructure And Modern Work

Tesserent Recognised As A Microsoft Solution Partner In Security, Azure Infrastructure And Modern Work

Tesserentย Cyber Solutions by Thales Australia has been recognised as a key Microsoft Solution Partner in security, Azure infrastructure and modern work.ย ย 
APAC Organisations Increase Adoption of AI/ML Solutions to Address Wide Range of API Security Challenges

APAC Organisations Increase Adoption of AI/ML Solutions to Address Wide Range of API Security Challenges

Latest research shows security misconfiguration as top concern in A/NZ. A/NZ organisations are mitigating security misconfiguration and authorisation issues with AI/ML and API gateways
Genetec Announces Australian Data Centre For Security Center SaaS Hosted By Microsoft Azure

Genetec Announces Australian Data Centre For Security Center SaaS Hosted By Microsoft Azure

Company to meet regionโ€™s growing demand for locally hosted cloud-based physical security technology SYDNEY โ€“ August 20, 2024 โ€“ Genetec Inc. (โ€œGenetecโ€), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced that Genetecโ„ข Security Center SaaS will be hosted in Australia on the ...
Post-Quantum Cryptography Algorithms: Thales Warns Organisations That The Transition To PQC Requires Careful Preparation

Post-Quantum Cryptography Algorithms: Thales Warns Organisations That The Transition To PQC Requires Careful Preparation

ThaPost Quantum Cryptography (PQR) is soon going to put an end to the encryption foundations we have relied upon for decades, forcing organisations to completely rethink how they approach digital security. There's been one more step in this post-quantum world becoming a reality earlier this week, with the National Institute of Standards and ...
Beyond the wail: deconstructing the BANSHEE infostealer

Beyond the wail: deconstructing the BANSHEE infostealer

The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.
Sophos Launches Dedicated Customer Success Team, Deepening Commitment to Customers and Channel Partners

Sophos Launches Dedicated Customer Success Team, Deepening Commitment to Customers and Channel Partners

Sophos is expanding its commitment to customers and channel partners with the launch of Sophos Customer Success. The new program features a team of experts who support customers throughout their post-sales experience with ongoing security resources and alerts, webinars and other educational information about cyberattacks, such as ransomware and data ...
Unit 42 Research Report Exposes Evolving Cybersecurity Risks Across Critical Industries

Unit 42 Research Report Exposes Evolving Cybersecurity Risks Across Critical Industries

New insight reveals increasing complexity and exposure in attack surfaces driven by AI-generated threats Palo Alto Networks, the global cybersecurity leader, today released its latest report, โ€˜2024 Unit 42 Attack Surface Threat Reportโ€™, revealing the rapidly evolving landscape of cybersecurity threats. The study, drawn from several petabytes of data ...
Vista Group Boosts Cloud Operations and Secures IT Infrastructure with Support From ManageEngine

Vista Group Boosts Cloud Operations and Secures IT Infrastructure with Support From ManageEngine

New-Zealand-founded Vista Group, a leading global provider of software and technology solutions across the film industry, obtainsย seamless resource management across multiple environments, proactive issue resolution, and assured compliance with help from ManageEngine. Founded in 1996, Vista Group started when founder Murray Holdaway was tasked by a ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This