The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Why Humans Are No Longer The Weakest Link In The Cyber Chain
Weโve all heard the mantra that โhumans are the weakest linkโ in any organisationโs cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, itโs no longer fair โ or effective โ to blame individuals for succumbing to attacks. Itโs Andrewโs view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams
Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing โ Industry Commentary from Tenable
Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services
Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australiaโs Water Utilities
In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications
APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift
In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense
In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability.ย Itโs a โdouble-edged swordโ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
In The News
Exabeam Continues To Innovate On AI-Driven Security Operations Across Self-Hosted, Cloud-Native, And Hybrid Environments Showcased By Its New Offering, LogRhythm Intelligence
Leading and largest pure-play SIEM vendor empowers security teams with enhanced functionality for faster, more accurate threat detection, investigation, and response
BROOMFIELD, Colo. and FOSTER CITY, Calif.โOct. 1, 2024 โ Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced its first quarterly product ...
VAST Data Founds Cosmos, a Tech Community with a Mission to Simplify and Accelerate AI Adoption, Exploration and Discovery
VAST Dataย today announced the launch of Cosmos, an initiative designed to transform how organisations build and advance AI, by creating a comprehensive and supportive environment to nurture innovation, collaboration, growth, and economic prosperity. This community is built of AI practitioners and for AI practitioners โ as researchers, technology ...
BT Readies Customers For Global Fabric So They Can Hit The Cloud Running
BT in live testing of its new, AI-ready network-as-a-service (NaaS) platform Global Fabric points of presence (PoPs) now installed in over 45 of the worldโs major cloud data-centres Demo of management portal allows customers to experiment with network configurations and APIs in advance of service launch
Quorum Cyber Teams With Microsoftโs Democracy Forward Group To Reveal New 2024 U.S. Presidential Election Cybersecurity Threats
Experts from Microsoftโs Democracy Forward team and Quorum Cyberโs Incident Response and Threat Intelligence teams will discuss current cybercriminal and nation-state actor attempts to undermine democratic processes and the integrity of elections.
OpenText Cybersecurityโs 2024 Threat Hunter Perspective Shows Collaboration Between Nation-States and Cybercrime Rings to Inflict More Damage
Adversaries are taking advantage of weak security fundamentals and a lack of countermeasures to carry out cyberattacks
Newgen Recognized in The Content Platforms Landscape, 2024, by an Independent Research Firm
Newgen Software, a global provider of AI-enabled digital transformation platform, has been identified by Forrester among โNotable Vendorsโ in โThe Content Platforms Landscape, Q3 2024,โ report, authored by Cheryl McKinnon et al.
Global cybersecurity report highlights concerning attitudes among young Australians towards online security
Today, the Australian Cyber Collaboration Centre (Aus3C) announced the release of the Annual Cybersecurity Attitudes and Behaviours Report (Oh Behave! 2024). The research reveals a pressing need to address growing concerns about attitudes towards online safety, with worrying trends particularly evident among younger Australians.
Over 6,500 ...
Check Point Software Recognised as a Visionary in Endpoint Security in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms
Check Point is acknowledged for its ability to execute and completeness of vision
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..