The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024
With the end of the year rapidly approaching, itโs time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
Unlocking Opportunities: Australian Talent in the US Job Market
A Conversation with Amy Meyer, Founder from Aussie Recruit on Overcoming Challenges and Thriving in the US
Protecting Production Lines – Why Nowโs The Time For Local Manufacturers To Get Serious About Cybersecurity
In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances.
Small to medium sized players have been under particular pressure, according to accountancy firm Grant Thorntonโs The State of Australian Manufacturing: ...
The Social Responsibility of Data Security
Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...
Soczilla Roadshow Launches in Australia and New Zealand
Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney.
The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by โZombieโ APIs
Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, theyโre much less welcome when it comes to the security of application programming interfaces (APIs).
The challenge of โzombie APIsโ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity
The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
In The News
JFrog Unveils First Runtime Security Solution to Deliver Complete Software Integrity and Lineage from Code to Cloud
Complete software lifecycle security enables organisations to simultaneously shift leftย & right, helping developers save time with quick threat detection and risk remediationย
JFrog Collaborates with NVIDIA to Deliver Secure AI Models With NVIDIA NIM
Aiming to meet the increasing demand for enterprise-ready generative AI, the JFrog Platform integrates NVIDIA NIM to deliver GPU-optimised AI model servicesย
Check Point Software Named a Leader in GigaOm Radar for Security Policy as Code
Built for the Modern CISO, Check Point's CloudGuard is recognised for delivering a cohesive approach to protecting cloud infrastructures, from code to cloud
Rapid7 Named a Leader in IDC MarketScape for Worldwide SIEM for SMB
Rapid7 has been positioned as a Leader in the IDC MarketScape: Worldwide SIEM for SMB 2024. SIEM technology often sits at the heart of the security operations centre (SOC) as it is core to compliance, monitoring, threat detection, and incident response across the attack surface.
Tenable Patch Tuesday Comments
This month, Microsoft patched two zero-day vulnerabilities that can bypass security features in Microsoft Office and Windows Mark of the Web. Both vulnerabilities were exploited in the wild, though specifics about these attacks were not publicly disclosed, though given the prevalence of Microsoft Office and Windows Mark of the Web, these ...
Trustwave’s 2024 Financial Services Threat Reports Highlight Alarming Trends In Insider Threats And Phishing-As-A-Service
September 11, 2024โฏโโฏTrustwave, a leading cybersecurity and managed security services provider, has released aโฏseries of reportsโฏdetailing the threats facing the financial services sector, marking the second year of its ongoing research into these critical security issues.
In its annual research, Trustwave SpiderLabs highlights the unique factors at ...
Ping Identity Named a Leader in KuppingerColeโs Passwordless for Enterprises Leadership Compass
DENVER, September 10, 2024 โ Ping Identity, a leading provider of seamless and secure digital experiences, has been named an Overall Leader in the 2024 KuppingerCole Leadership Compass report on Passwordless Authentication for Enterprises. The report explores workforce-focused passwordless authentication technologies and shares guidance on the most ...
Tenable Introduces AI Aware: A Groundbreaking Proactive Security Solution for AI and Large Language Models
Tenableยฎ, the exposure management company, today announced the release of AI Aware, advanced detection capabilities designed to rapidly surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management, the worldโs #1 vulnerability management solution. Tenable AI Aware provides exposure insight into ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..