The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Weโ€™ve all heard the mantra that โ€˜humans are the weakest linkโ€™ in any organisationโ€™s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, itโ€™s no longer fair โ€” or effective โ€” to blame individuals for succumbing to attacks. Itโ€™s Andrewโ€™s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing โ€“ Industry Commentary from Tenable

Credential Stuffing โ€“ Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australiaโ€™s Water Utilities

Improving Cybersecurity Within Australiaโ€™s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability.ย Itโ€™s a โ€˜double-edged swordโ€™ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...

In The News

New Veeam Recon Scanner Proactively Identifies Cyber Threats By Leveraging Patent-Pending Technology And The Largest Database Of Cyber Incidents In The World

New Veeam Recon Scanner Proactively Identifies Cyber Threats By Leveraging Patent-Pending Technology And The Largest Database Of Cyber Incidents In The World

Veeamยฎ Software, the #1 leader by market share in Data Resilience, today announced the addition of new Veeam Recon Scanner technology to Veeam Data Platform during the VeeamON Data Resilience Summit. This groundbreaking technology, developed by Coveware by Veeam, draws on years of experience in cyber-extortion incident response and the largest database ...
VAST Data And Equinix Collaborate To Provide Dedicated, Secure AI Infrastructure Solution Validated For NVIDIA DGX SuperPOD

VAST Data And Equinix Collaborate To Provide Dedicated, Secure AI Infrastructure Solution Validated For NVIDIA DGX SuperPOD

VAST Data today announced a new collaboration with Equinix that leverages the VAST Data Platform for NVIDIA DGX systems and the NVIDIA AI Enterprise platform, deployed in Equinix International Business Exchangeโ„ข (IBXยฎ) high-performance data centres. This collaboration provides the infrastructure foundation of an AI development platform to help ...
VAST Data Expands Partnership With Cisco To Deliver End-To-End, Full Stack AI Infrastructure

VAST Data Expands Partnership With Cisco To Deliver End-To-End, Full Stack AI Infrastructure

VAST Dataย today announced it has extended its collaboration with Cisco (NASDAQ: CSCO), the leader in enterprise networking and security, to further simplify AI deployments for enterprises. Through this growing partnership, Cisco plans to offer the VAST Data Platform natively on select Cisco Unified Computing System (UCS) servers as an integrated ...
VAST Data Unveils Groundbreaking VAST InsightEngine With NVIDIA To Unlock Insights From All Enterprise Data

VAST Data Unveils Groundbreaking VAST InsightEngine With NVIDIA To Unlock Insights From All Enterprise Data

VAST Dataย  today announced VAST InsightEngine with NVIDIA, the worldโ€™s first solution to securely ingest, process, and retrieve all enterprise data (files, objects, tables, and streams) in real time. As the first application workflow to run on the VAST Data Platform, VAST InsightEngine with NVIDIA accelerates business insights by capturing, embedding, ...
Exabeam Continues To Innovate On AI-Driven Security Operations Across Self-Hosted, Cloud-Native, And Hybrid Environments Showcased By Its New Offering, LogRhythm Intelligence

Exabeam Continues To Innovate On AI-Driven Security Operations Across Self-Hosted, Cloud-Native, And Hybrid Environments Showcased By Its New Offering, LogRhythm Intelligence

Leading and largest pure-play SIEM vendor empowers security teams with enhanced functionality for faster, more accurate threat detection, investigation, and response BROOMFIELD, Colo. and FOSTER CITY, Calif.โ€”Oct. 1, 2024 โ€” Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced its first quarterly product ...
VAST Data Founds Cosmos, a Tech Community with a Mission to Simplify and Accelerate AI Adoption, Exploration and Discovery

VAST Data Founds Cosmos, a Tech Community with a Mission to Simplify and Accelerate AI Adoption, Exploration and Discovery

VAST Dataย today announced the launch of Cosmos, an initiative designed to transform how organisations build and advance AI, by creating a comprehensive and supportive environment to nurture innovation, collaboration, growth, and economic prosperity. This community is built of AI practitioners and for AI practitioners โ€“ as researchers, technology ...
BT Readies Customers For Global Fabric So They Can Hit The Cloud Running

BT Readies Customers For Global Fabric So They Can Hit The Cloud Running

BT in live testing of its new, AI-ready network-as-a-service (NaaS) platform Global Fabric points of presence (PoPs) now installed in over 45 of the worldโ€™s major cloud data-centres Demo of management portal allows customers to experiment with network configurations and APIs in advance of service launch
Quorum Cyber Teams With Microsoftโ€™s Democracy Forward Group To Reveal New 2024 U.S. Presidential Election Cybersecurity Threats

Quorum Cyber Teams With Microsoftโ€™s Democracy Forward Group To Reveal New 2024 U.S. Presidential Election Cybersecurity Threats

Experts from Microsoftโ€™s Democracy Forward team and Quorum Cyberโ€™s Incident Response and Threat Intelligence teams will discuss current cybercriminal and nation-state actor attempts to undermine democratic processes and the integrity of elections.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This