The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Soczilla Roadshow Launches in Australia and New Zealand
Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney.
The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by โZombieโ APIs
Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, theyโre much less welcome when it comes to the security of application programming interfaces (APIs).
The challenge of โzombie APIsโ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity
The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT
The term โcritical infrastructureโ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers โ particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets
INTRODUCTION
While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, weโre referring to data.
By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa
The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australiaโs finance sector needs
Information security is a journey, but calls of, โAre we there yet?โ are getting louder and more frequent.
In The News
JFrog and GitHub Expand Partnership, Deliver Single Pane of Glass for Security and Copilot Chat to Empower Developers
JFrog Ltd.ย (โJFrogโ) (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, and GitHub, the worldโs leading code development platform, today unveiled new integrations at JFrogโs annual user conference. The deepening collaboration provides developers with a consolidated view of project status and security ...
ColorTokens Acquires PureID to Strengthen Xshield Microsegmentation Platform with Powerful Identity-Based Segmentation
SAN JOSE, Calif., September 11, 2024 โ ColorTokens Inc., the leading global enterprise microsegmentation company, announced today that it has acquired PureID, an innovative startup providing secure identity and access management. This acquisition will significantly strengthen ColorTokensโ microsegmentation capabilities by integrating robust identity ...
Armis Appoints Christina Kemper to Vice President of International
Armis, the asset intelligence cybersecurity company, today announced the appointment of Christina Kemper to VP of International. In her role, Kemper will accelerate international sales growth and expand Armisโ global presence forging strategic partnerships with organisations across EMEA and Asia Pacific to help businesses manage their cyber risk ...
BeyondTrust Named a Leader in 2024 Gartnerยฎ Magic Quadrantโข for Privileged Access Management
For the sixth consecutive year, BeyondTrust is named a Leader in the Gartnerยฎ Magic Quadrantโข for Privileged Access Management (PAM)
BeyondTrustโsย โAbility to Executeโ and โCompleteness of Visionโ are the reasons why it was named a Gartner Magic Quadrantโข Leader
Being recognised as a Leader in PAM and ITDR, we believe, BeyondTrust is uniquely poised ...
Genetec Expands Security Center SaaS With The Launch ofโฏOperationsโฏCenter, The Industryโs First Work Management Solution For Physical Security Operations
MONTRรAL, September 11, 2024 โ Genetec Inc. (โGenetecโ), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced the launch of Operations Center, a cloud-based work management solution designed specifically for physical security operations. Available as part of Security Center ...
JFrog Unveils First Runtime Security Solution to Deliver Complete Software Integrity and Lineage from Code to Cloud
Complete software lifecycle security enables organisations to simultaneously shift leftย & right, helping developers save time with quick threat detection and risk remediationย
JFrog Collaborates with NVIDIA to Deliver Secure AI Models With NVIDIA NIM
Aiming to meet the increasing demand for enterprise-ready generative AI, the JFrog Platform integrates NVIDIA NIM to deliver GPU-optimised AI model servicesย
Check Point Software Named a Leader in GigaOm Radar for Security Policy as Code
Built for the Modern CISO, Check Point's CloudGuard is recognised for delivering a cohesive approach to protecting cloud infrastructures, from code to cloud
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..