The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

SMS services remain a critical part of telecommunications; they don't require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in their never-ending campaigns. And if you think that the new RCS messaging standard will ...
Data Privacy Week – Taking Control of Data

Data Privacy Week – Taking Control of Data

Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data have the power and the responsibility to take control of data and use it for the common good.
Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Jo Stewart-Rattray: “It is paramount that organisations understand what is expected of them in order to devise an effective privacy policy and implement accordingly. Then will they be able to realise the benefits of embedding privacy practices in digital transformation from the outset, including customer loyalty, reputational and financial performance.”
People Are An Essential Element In Your Cybersecurity Incident Response Plan

People Are An Essential Element In Your Cybersecurity Incident Response Plan

Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...
Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk.  However, many ...
Ransomware Attacks: No Sector is Safe

Ransomware Attacks: No Sector is Safe

Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...
Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Introduction In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...
Australia Sanctions Russian Hacker

Australia Sanctions Russian Hacker

Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
No results found.

In The News

Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus ...
Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report

Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report

Genetec bolsters #2 global ranking with six consecutive years of organic growth
OpenText Launches New Partner Enterprise Learning Subscription

OpenText Launches New Partner Enterprise Learning Subscription

New program helps Partners build skills and gives customers confidence in their Partner choice 
The Dark Side of Domain-Specific Languages: Tenable Uncovers New Attack Techniques in Open Source Software

The Dark Side of Domain-Specific Languages: Tenable Uncovers New Attack Techniques in Open Source Software

Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has uncovered new attack techniques in Domain-Specific Languages (DSLs) of popular policy-as-code (PaC) and infrastructure-as-code (IaC) platforms. These can lead to compromised cloud identities, lateral movement, and data ...
OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

 Next-generation cloud, security, AI-integrated innovations unveiled at OpenText World 2024  About OpenText OpenText, The Information Company™, enables organisations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions. For more information about OpenText (NASDAQ: OTEX, TSX: OTEX) ...
Informatica Tackles Microsoft Azure Megatrends of GenAI, Microsoft Fabric and Open Table Format with New Capabilities  

Informatica Tackles Microsoft Azure Megatrends of GenAI, Microsoft Fabric and Open Table Format with New Capabilities  

The advanced solutions include an easy-to-implement Blueprint for Azure OpenAI Service, enhanced SQL ELT and support for Apache Iceberg open table format
Arctic Wolf Builds on the Arctic Wolf Aurora Platform with New Threat Intelligence Module

Arctic Wolf Builds on the Arctic Wolf Aurora Platform with New Threat Intelligence Module

Arctic Wolf®, a global leader in security operations, today announced the expansion of the Arctic Wolf AuroraTM Platform with the addition of Arctic Wolf Threat Intelligence, a new module that allows organisations to stay ahead of threats by gaining access to real-time threat intelligence and curated reporting.
Threat Spotlight: Bad Bots are Evolving to Become More ‘Human’

Threat Spotlight: Bad Bots are Evolving to Become More ‘Human’

The bot landscape is changing. Malicious — or bad bots — are evolving to become more advanced and human-like in their behavior, while an emerging category of AI bots, which we might think of as “grey bots,” is blurring the boundary of legitimate activity. Barracuda security researchers analyzed bot-related traffic and activity targeting web ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This