The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Weโ€™ve all heard the mantra that โ€˜humans are the weakest linkโ€™ in any organisationโ€™s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, itโ€™s no longer fair โ€” or effective โ€” to blame individuals for succumbing to attacks. Itโ€™s Andrewโ€™s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing โ€“ Industry Commentary from Tenable

Credential Stuffing โ€“ Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australiaโ€™s Water Utilities

Improving Cybersecurity Within Australiaโ€™s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability.ย Itโ€™s a โ€˜double-edged swordโ€™ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...

In The News

Exabeam Continues To Innovate On AI-Driven Security Operations Across Self-Hosted, Cloud-Native, And Hybrid Environments Showcased By Its New Offering, LogRhythm Intelligence

Exabeam Continues To Innovate On AI-Driven Security Operations Across Self-Hosted, Cloud-Native, And Hybrid Environments Showcased By Its New Offering, LogRhythm Intelligence

Leading and largest pure-play SIEM vendor empowers security teams with enhanced functionality for faster, more accurate threat detection, investigation, and response BROOMFIELD, Colo. and FOSTER CITY, Calif.โ€”Oct. 1, 2024 โ€” Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced its first quarterly product ...
VAST Data Founds Cosmos, a Tech Community with a Mission to Simplify and Accelerate AI Adoption, Exploration and Discovery

VAST Data Founds Cosmos, a Tech Community with a Mission to Simplify and Accelerate AI Adoption, Exploration and Discovery

VAST Dataย today announced the launch of Cosmos, an initiative designed to transform how organisations build and advance AI, by creating a comprehensive and supportive environment to nurture innovation, collaboration, growth, and economic prosperity. This community is built of AI practitioners and for AI practitioners โ€“ as researchers, technology ...
BT Readies Customers For Global Fabric So They Can Hit The Cloud Running

BT Readies Customers For Global Fabric So They Can Hit The Cloud Running

BT in live testing of its new, AI-ready network-as-a-service (NaaS) platform Global Fabric points of presence (PoPs) now installed in over 45 of the worldโ€™s major cloud data-centres Demo of management portal allows customers to experiment with network configurations and APIs in advance of service launch
Quorum Cyber Teams With Microsoftโ€™s Democracy Forward Group To Reveal New 2024 U.S. Presidential Election Cybersecurity Threats

Quorum Cyber Teams With Microsoftโ€™s Democracy Forward Group To Reveal New 2024 U.S. Presidential Election Cybersecurity Threats

Experts from Microsoftโ€™s Democracy Forward team and Quorum Cyberโ€™s Incident Response and Threat Intelligence teams will discuss current cybercriminal and nation-state actor attempts to undermine democratic processes and the integrity of elections.
OpenText Cybersecurityโ€™s 2024 Threat Hunter Perspective Shows Collaboration Between Nation-States and Cybercrime Rings to Inflict More Damage

OpenText Cybersecurityโ€™s 2024 Threat Hunter Perspective Shows Collaboration Between Nation-States and Cybercrime Rings to Inflict More Damage

Adversaries are taking advantage of weak security fundamentals and a lack of countermeasures to carry out cyberattacks
Newgen Recognized in The Content Platforms Landscape, 2024, by an Independent Research Firm

Newgen Recognized in The Content Platforms Landscape, 2024, by an Independent Research Firm

Newgen Software, a global provider of AI-enabled digital transformation platform, has been identified by Forrester among โ€˜Notable Vendorsโ€™ in โ€œThe Content Platforms Landscape, Q3 2024,โ€ report, authored by Cheryl McKinnon et al.
Global cybersecurity report highlights concerning attitudes among young Australians towards online security

Global cybersecurity report highlights concerning attitudes among young Australians towards online security

Today, the Australian Cyber Collaboration Centre (Aus3C) announced the release of the Annual Cybersecurity Attitudes and Behaviours Report (Oh Behave! 2024). The research reveals a pressing need to address growing concerns about attitudes towards online safety, with worrying trends particularly evident among younger Australians. Over 6,500 ...
Check Point Software Recognised as a Visionary in Endpoint Security in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms

Check Point Software Recognised as a Visionary in Endpoint Security in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms

Check Point is acknowledged for its ability to execute and completeness of vision

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This