The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...
How CIAM Platforms Improve Customer Privacy and Security

How CIAM Platforms Improve Customer Privacy and Security

As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.
Secure Code Warrior to Host 3rd Annual Devlympics Competition

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
How deep is the depth of the deepfake?

How deep is the depth of the deepfake?

Use of deepfakes has risen dramatically over the last two years. Weโ€™ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesnโ€™t stop there.
It’s been 12 Months since the Optus Breach.  Now What?

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
How purpose-built database security solutions ensure vulnerabilities arenโ€™t overlooked

How purpose-built database security solutions ensure vulnerabilities arenโ€™t overlooked

The perimeters of technological defences are shifting, andโ€”in some casesโ€”disappearing altogether.

In The News

ACS And ISACA Strengthen Ties With Expanded Memorandum Of Understanding

ACS And ISACA Strengthen Ties With Expanded Memorandum Of Understanding

New MoU aims to elevate member benefits and combat global IT skills shortage
Check Point Software Celebrates Partner Success at the Asia Pacific Partner Conference 2024

Check Point Software Celebrates Partner Success at the Asia Pacific Partner Conference 2024

Sydney โ€“ September 9, 2024 -- Check Pointยฎ Software Technologies Ltd. (NASDAQ: CHKP), a leading leading cyber security platform provider of AI-powered, cloud delivered solutions globally, recognised the top partners across the Asia Pacific region during this yearโ€™s Check Point Asia Pacific Partner Conference 2024. Held in Phuket, Thailand from 2nd - ...
Infoblox and Baidam Pioneer Australian-first Fraudulent Website Takedown Service

Infoblox and Baidam Pioneer Australian-first Fraudulent Website Takedown Service

Infoblox and Indigenous Australian ICT and cyber security company, Baidam, today announced the launch of Baidam Takedown Services, an Australian-first capability that can take down lookalike websites and scam domains within a week using the Domain Name System (DNS). This industry-first capability comes as the Australian Competition & Consumer ...
Interactive Works With Homestyle To Humanise Technology

Interactive Works With Homestyle To Humanise Technology

Interactiveโ€™s all-encompassing solution provides families of aged care residents with peace of mind
Absolute Security Acquires Syxsense, Adds Automated Endpoint And Vulnerability Management To Its Next Generation Cyber Resilience Platform

Absolute Security Acquires Syxsense, Adds Automated Endpoint And Vulnerability Management To Its Next Generation Cyber Resilience Platform

Absolute Security has acquired Syxsense, Adding Automated Endpoint and Vulnerability Management to its Next Generation Cyber Resilience Platform. Embedded in the firmware of 600 million PCs, the Absolute Cyber Resilience platform delivers unmatched endpoint control, visibility, and resilience for applications and security controls. With Syxsense ...
Omega Healthcare Successfully Adopts ColorTokensโ€™ Zero Trust Microsegmentation Architecture

Omega Healthcare Successfully Adopts ColorTokensโ€™ Zero Trust Microsegmentation Architecture

ColorTokens Inc., the leading enterprise microsegmentation company, today announced that Omega Healthcare, a leader in technology-enabled solutions for the healthcare providers, payers, and pharma industries has implemented the companyโ€™s zero trust microsegmentation architecture across its extensive server network to mitigate the risk of data breaches ...
BeyondTrust Recognised as a 2024 Gartnerยฎ Peer InsightsTM Customersโ€™ Choice for Remote Desktop Software for Second Consecutive Year

BeyondTrust Recognised as a 2024 Gartnerยฎ Peer InsightsTM Customersโ€™ Choice for Remote Desktop Software for Second Consecutive Year

The Gartnerยฎ Peer Insightsโ„ข โ€œCustomersโ€™ Choiceโ€ distinction is based on feedback and ratings from end-user professionals who have experience purchasing, implementing and using BeyondTrust products As of June 30, 2024, BeyondTrust has earned an end-user review overall rating of 4.6 out of 5 in the Remote Desktop Software market, with 97% of reviewers ...
Tenable Enhances Nessus Risk Prioritisation To Help Customers Expose And Close Exposures – Integration of EPSS Into Tenable Exposure Solutions Ensures Compliance And Accelerates Prioritisation Efforts

Tenable Enhances Nessus Risk Prioritisation To Help Customers Expose And Close Exposures – Integration of EPSS Into Tenable Exposure Solutions Ensures Compliance And Accelerates Prioritisation Efforts

Tenableยฎ, the exposure management company, today announced new risk prioritisation and compliance features forย Tenable Nessus, the #1 vulnerability assessment solution in accuracy, coverage and adoption. Nessus supports new and updated vulnerability scoring systems โ€“ Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This