The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by โ€˜Zombieโ€™ APIs

The Security Threat Posed by โ€˜Zombieโ€™ APIs

Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, theyโ€™re much less welcome when it comes to the security of application programming interfaces (APIs). The challenge of โ€˜zombie APIsโ€™ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term โ€˜critical infrastructureโ€™ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers โ€“ particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, weโ€™re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australiaโ€™s finance sector needs

PAM may be the infosec pressure relief valve Australiaโ€™s finance sector needs

Information security is a journey, but calls of, โ€˜Are we there yet?โ€™ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.

In The News

Forescout Announces New SaaS Operational Technologies Solution

Forescout Announces New SaaS Operational Technologies Solution

Forescout Technologies has announcedโ€ฏits new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organisations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid. Forescout for OT Security combines: ...
Cloudflare Helps Content Creators Regain Control Of Their Content from AI Bots

Cloudflare Helps Content Creators Regain Control Of Their Content from AI Bots

With new tools to automatically control how AI bots can access content, Cloudflare is the first to stand up for content creators at scale
Rapid7 Adds Extended Ecosystem Support Of Third-Party Detections To Managed Detection And Response

Rapid7 Adds Extended Ecosystem Support Of Third-Party Detections To Managed Detection And Response

Rapid7 has announced the addition of third-party detections for defence in-depth with Managed Threat Complete (MTC), the companyโ€™s Managed Detection and Response (MDR) solution. Rapid7โ€™s global service now includes coverage for CrowdStrike Falcon, SentinelOne Singularity Endpoint, and Microsoft Defender for Endpoint.
Vulnerable APIs And Bot Attacks Costing Australian Businesses Up To $2 Billion Annually

Vulnerable APIs And Bot Attacks Costing Australian Businesses Up To $2 Billion Annually

Sydney, Australia โ€” 23 September, 2024 โ€”ย Thales, the cybersecurity leader that protects critical applications, APIs, and data, anywhere at scale, releases the โ€œEconomic Impact of API and Bot Attacksโ€ report. The analysis of more than 161,000 unique cybersecurity incidents estimates that API insecurity and automated abuse by bots is responsible for as ...
Check Point Software Is Recognised As A Leader In Email Security, Showcasing Its Innovative AI-Based Threat Intelligence Capabilities

Check Point Software Is Recognised As A Leader In Email Security, Showcasing Its Innovative AI-Based Threat Intelligence Capabilities

Harmony Email & Collaboration is celebrated for its continuous stream of patents and innovative features, achieving an eightfold growth in just three years   Redwood City, CA โ€“ September 20, 2024 ย โ€“ Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading cyber security platform provider of AI-powered, cloud delivered solutions, ...
Camelot Secure Named A Two-Category Finalist By Cybersecurity Assoc. Of Maryland, Inc. (CAMI) 8th Annual Cybersecurity Awards

Camelot Secure Named A Two-Category Finalist By Cybersecurity Assoc. Of Maryland, Inc. (CAMI) 8th Annual Cybersecurity Awards

Camelot Secure has made significant strides in cybersecurity innovation through its Advanced Persistent Threat (APT) Hunting service. The companyโ€™s Secure360 platform, which integrates AI, machine learning, and advanced threat intelligence, proactively detects and neutralizes cyber threats before they infiltrate critical systems. As a Diversity ...
Cost Of Living Crisis Widening The Digital Divide For Government Services: Publicis Sapient Digital Citizen Report 2024

Cost Of Living Crisis Widening The Digital Divide For Government Services: Publicis Sapient Digital Citizen Report 2024

The number of Australians suffering financial hardship has surged by 85% in the past year, with lower-income households not using online government services available to them compared to higher-income households, according to the latest Publicis Sapient Digital Citizen Report 2024. The third edition of the annualย report,ย "Noย Citizenย Left Behind" - ...
Accelerator with AWS and NVIDIA to Support the Next Generation of Global Cloud Security Companies

Accelerator with AWS and NVIDIA to Support the Next Generation of Global Cloud Security Companies

AUSTIN, Texas and Fal.Con 2024, Las Vegas โ€“ September 16, 2024ย โ€”ย CrowdStrikeย (NASDAQ: CRWD) today announced the launch of its second annual Cybersecurity Startup Accelerator with Amazon Web Services (AWS). NVIDIA also joins in supporting the Accelerator program, powering the next generation of artificial intelligence (AI) and cloud security startups. ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This