The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by โZombieโ APIs
Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, theyโre much less welcome when it comes to the security of application programming interfaces (APIs).
The challenge of โzombie APIsโ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity
The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT
The term โcritical infrastructureโ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers โ particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets
INTRODUCTION
While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, weโre referring to data.
By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa
The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australiaโs finance sector needs
Information security is a journey, but calls of, โAre we there yet?โ are getting louder and more frequent.

Solving the Skills Shortage by Looking Within
Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.
In The News
Forescout Announces New SaaS Operational Technologies Solution
Forescout Technologies has announcedโฏits new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organisations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid.
Forescout for OT Security combines:
...
Cloudflare Helps Content Creators Regain Control Of Their Content from AI Bots
With new tools to automatically control how AI bots can access content, Cloudflare is the first to stand up for content creators at scale
Rapid7 Adds Extended Ecosystem Support Of Third-Party Detections To Managed Detection And Response
Rapid7 has announced the addition of third-party detections for defence in-depth with Managed Threat Complete (MTC), the companyโs Managed Detection and Response (MDR) solution. Rapid7โs global service now includes coverage for CrowdStrike Falcon, SentinelOne Singularity Endpoint, and Microsoft Defender for Endpoint.
Vulnerable APIs And Bot Attacks Costing Australian Businesses Up To $2 Billion Annually
Sydney, Australia โ 23 September, 2024 โย Thales, the cybersecurity leader that protects critical applications, APIs, and data, anywhere at scale, releases the โEconomic Impact of API and Bot Attacksโ report. The analysis of more than 161,000 unique cybersecurity incidents estimates that API insecurity and automated abuse by bots is responsible for as ...
Check Point Software Is Recognised As A Leader In Email Security, Showcasing Its Innovative AI-Based Threat Intelligence Capabilities
Harmony Email & Collaboration is celebrated for its continuous stream of patents and innovative features, achieving an eightfold growth in just three years
Redwood City, CA โ September 20, 2024 ย โ Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading cyber security platform provider of AI-powered, cloud delivered solutions, ...
Camelot Secure Named A Two-Category Finalist By Cybersecurity Assoc. Of Maryland, Inc. (CAMI) 8th Annual Cybersecurity Awards
Camelot Secure has made significant strides in cybersecurity innovation through its Advanced Persistent Threat (APT) Hunting service. The companyโs Secure360 platform, which integrates AI, machine learning, and advanced threat intelligence, proactively detects and neutralizes cyber threats before they infiltrate critical systems. As a Diversity ...
Cost Of Living Crisis Widening The Digital Divide For Government Services: Publicis Sapient Digital Citizen Report 2024
The number of Australians suffering financial hardship has surged by 85% in the past year, with lower-income households not using online government services available to them compared to higher-income households, according to the latest Publicis Sapient Digital Citizen Report 2024.
The third edition of the annualย report,ย "Noย Citizenย Left Behind" - ...
Accelerator with AWS and NVIDIA to Support the Next Generation of Global Cloud Security Companies
AUSTIN, Texas and Fal.Con 2024, Las Vegas โ September 16, 2024ย โย CrowdStrikeย (NASDAQ: CRWD) today announced the launch of its second annual Cybersecurity Startup Accelerator with Amazon Web Services (AWS). NVIDIA also joins in supporting the Accelerator program, powering the next generation of artificial intelligence (AI) and cloud security startups. ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..