The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Soczilla Roadshow Launches in Australia and New Zealand
Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney.
The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by โZombieโ APIs
Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, theyโre much less welcome when it comes to the security of application programming interfaces (APIs).
The challenge of โzombie APIsโ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity
The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT
The term โcritical infrastructureโ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers โ particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets
INTRODUCTION
While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, weโre referring to data.
By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa
The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australiaโs finance sector needs
Information security is a journey, but calls of, โAre we there yet?โ are getting louder and more frequent.
In The News
SentinelOne and Lenovo Collaborate to Protect Lenovo PCs with Embedded AI Security
Multi-year deal will bring SentinelOneโs Singularity Platform and Purple AI to millions of new Lenovo PCs
Tenable Comment On OAIC Report
The Notifiable Data Breaches Report from the OAIC continues to underscore just how prevalent malicious or criminal attacks are when it comes to data breaches, accounting for 67% of breaches in Australia from January through June 2024. Human Error, which accounted for nearly a third (30%) is another major contributor to data breaches across the board ...
Quorum Cyber Accelerates Growth with Strategic Acquisition of Difenda
The announcement underscores Quorum Cyber's global momentum and strengthens its position as a leader of Microsoft Security services.
Tenable Research Discovers Critical RCE Vulnerability in Google Cloud Platform, Potentially Compromising Millions of Servers
Tenable, the exposure management company has disclosed that its Tenable Research team has discovered a critical remote code execution (RCE) vulnerability, dubbed CloudImposer, that could have allowed malicious attackers to execute code on potentially millions of Google Cloud Platform (GCP) servers and their customers' systems. This vulnerability ...
Tecala Appointed as Netskope Managed Services Partner
SYDNEY โ September 16, 2024: Leading technology service provider Tecala today announced its expanded partnership with Netskope, a leader in Secure Access Service Edge (SASE), with the appointment to Netskopeโs Managed Service Provider (MSP) Program.
The Netskope MSP Program is a specialisation within the companyโs Evolve Partner Program for partners ...
Most Educational Organisations Paid More Than the Original Ransom Demand, Says Sophos Survey
Sophos today released findings from its annual sector survey report, โThe State of Ransomware in Education 2024.โ According to the report, the median ransom payment was $6.6 million for lower education and $4.4 million for higher education organisations. In addition, the survey states that 55% of lower education respondents and 67% of higher education ...
CrowdStrike and 1Password Expand Partnership to Protect 150,000 Customers and Empower SMBs
Strategic partnership delivers AI-native protection purpose-built for SMBs to stop breaches
First Look: Exploring OpenAI o1 in GitHub Copilot
Today, OpenAI released OpenAI o1, a new series of AI models equipped with advanced reasoning capabilities to solve hard problems. Like you, we are excited to put the new o1 model through its paces and have tested integrating o1-preview with GitHub Copilot. While we are exploring many use cases with this new model, such as debugging large-scale systems, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..