The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
The Social Responsibility of Data Security
Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...
Soczilla Roadshow Launches in Australia and New Zealand
Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney.
The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by ‘Zombie’ APIs
Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs).
The challenge of ‘zombie APIs’ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity
The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT
The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets
INTRODUCTION
While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data.
By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa
The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
In The News
ExtraHop® Automates Detection and Response Workflows for Customers with CrowdStrike Falcon® Next-Gen SIEM
Network telemetry from ExtraHop RevealX™ helps SOC analysts reveal and stop threats faster
ExtraHop® Named 2024 CrowdStrike Ecosystem Innovator of the Year
LAS VEGAS – September 17, 2024 – ExtraHop®, a leader in cloud-native network detection and response (NDR), announced today at CrowdStrike’s Global Partner Summit at Fal.Con 2024 that it has been named the 2024 CrowdStrike Ecosystem Innovator of the Year.
Earlier this year, ExtraHop announced its integration with CrowdStrike Falcon Next-Gen SIEM, ...
Arctic Wolf Security Operations Report Reveals Threat Landscape Intensifies, Almost Half of Security Incidents Occur After Hours
Technology companies drastically trail other industries in overall security posture
SentinelOne and Lenovo Collaborate to Protect Lenovo PCs with Embedded AI Security
Multi-year deal will bring SentinelOne’s Singularity Platform and Purple AI to millions of new Lenovo PCs
Tenable Comment On OAIC Report
The Notifiable Data Breaches Report from the OAIC continues to underscore just how prevalent malicious or criminal attacks are when it comes to data breaches, accounting for 67% of breaches in Australia from January through June 2024. Human Error, which accounted for nearly a third (30%) is another major contributor to data breaches across the board ...
Quorum Cyber Accelerates Growth with Strategic Acquisition of Difenda
The announcement underscores Quorum Cyber's global momentum and strengthens its position as a leader of Microsoft Security services.
Tenable Research Discovers Critical RCE Vulnerability in Google Cloud Platform, Potentially Compromising Millions of Servers
Tenable, the exposure management company has disclosed that its Tenable Research team has discovered a critical remote code execution (RCE) vulnerability, dubbed CloudImposer, that could have allowed malicious attackers to execute code on potentially millions of Google Cloud Platform (GCP) servers and their customers' systems. This vulnerability ...
Tecala Appointed as Netskope Managed Services Partner
SYDNEY – September 16, 2024: Leading technology service provider Tecala today announced its expanded partnership with Netskope, a leader in Secure Access Service Edge (SASE), with the appointment to Netskope’s Managed Service Provider (MSP) Program.
The Netskope MSP Program is a specialisation within the company’s Evolve Partner Program for partners ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..