The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Proofpoint: 78% of Australiaโ€™s Banks Are Not Proactively Blocking Fraudulent Emails

Proofpoint: 78% of Australiaโ€™s Banks Are Not Proactively Blocking Fraudulent Emails

Proofpoint, Inc., a leading cybersecurity and compliance company, today released new research identifying that almost 4 out of 5 Australian-owned authorised deposit-taking institutions and foreign subsidiary banks areย lagging behind on basic cybersecurity measures, subjecting customers, staff and stakeholders to a higher risk of email-based ...
Artificial Intelligence and AIOps May Be the Key to Understanding Todayโ€™s World of Exploding Data

Artificial Intelligence and AIOps May Be the Key to Understanding Todayโ€™s World of Exploding Data

โ€œThe Library of Babelโ€ is an imaginary library containing countless rooms and books with every possible combination of letters and numbers.
Decoy Dog is No Ordinary Pupy โ€“ Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Decoy Dog is No Ordinary Pupy โ€“ Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Infoblox Inc., the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection, today published a second threat report with critical updates on โ€œDecoy Dog,โ€ the remote access trojan (RAT) toolkit they discovered and disclosed in April 2023.
Ways to Reduce the Risk of Burnout in your IT Security Team

Ways to Reduce the Risk of Burnout in your IT Security Team

With organisations experiencing a constantly growing wave of cyberattacks, many IT security teams are feeling the pressure. Stressful work environments and long hours are resulting in staff feeling overwhelmed and burnt out.
How securing remote management tools provides better protection for businesses

How securing remote management tools provides better protection for businesses

The latest data reveals that Australian small businesses lost almost $13.7 million to scams in 2022, an increase of 95 per cent compared to 2021, according to the Australian Competition and Consumer Commission (ACCC).
Forescout Uncovers The 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Forescout Uncovers The 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisationsโ€™ networks. In 2020, Forescout released the first Enterprise of Things Security Report, followed in 2022 with the Riskiest Connected Devices in Enterprise Networks report.
Five Ways to Ensure Compliance when Managing Customer Data

Five Ways to Ensure Compliance when Managing Customer Data

As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.
Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructureโ€™s resilience

In The News

Tenable Empowers Global Fashion Group to Elevate Cloud Security and Streamline Cyber Risk Communication

Tenable Empowers Global Fashion Group to Elevate Cloud Security and Streamline Cyber Risk Communication

Tenable One consolidates security tools into unified view, improving visibility and context of attack surface
Trustwave Appointed to Department of Defence ICTPA Panel

Trustwave Appointed to Department of Defence ICTPA Panel

Canberra, Australia โ€“ 21 August, 2024 โ€“ Trustwave, a global leader in managed security services, proudly announced its appointment to the Information Communications Technology Provider Arrangement (ICTPA) panel. This appointment marks a significant milestone for Trustwave Asia Pacific, as it opens new avenues for the company to directly provide ...
2024 CrowdStrike Threat Hunting Report: Nation-States Exploit Legitimate Credentials to Pose as Insiders

2024 CrowdStrike Threat Hunting Report: Nation-States Exploit Legitimate Credentials to Pose as Insiders

North Korean insider threat targets U.S. technology companies; cloud and cross-domain attacks, credential and RMM tool abuse persists
Nozomi Networks and Schweitzer Engineering Laboratories Bring Expert Cybersecurity Solutions and Support to Critical Infrastructure

Nozomi Networks and Schweitzer Engineering Laboratories Bring Expert Cybersecurity Solutions and Support to Critical Infrastructure

Partnership provides enhanced visibility of network assets and traffic, and threat detection for utility and industrial control systems.
Tesserent Recognised As A Microsoft Solution Partner In Security, Azure Infrastructure And Modern Work

Tesserent Recognised As A Microsoft Solution Partner In Security, Azure Infrastructure And Modern Work

Tesserentย Cyber Solutions by Thales Australia has been recognised as a key Microsoft Solution Partner in security, Azure infrastructure and modern work.ย ย 
APAC Organisations Increase Adoption of AI/ML Solutions to Address Wide Range of API Security Challenges

APAC Organisations Increase Adoption of AI/ML Solutions to Address Wide Range of API Security Challenges

Latest research shows security misconfiguration as top concern in A/NZ. A/NZ organisations are mitigating security misconfiguration and authorisation issues with AI/ML and API gateways
Genetec Announces Australian Data Centre For Security Center SaaS Hosted By Microsoft Azure

Genetec Announces Australian Data Centre For Security Center SaaS Hosted By Microsoft Azure

Company to meet regionโ€™s growing demand for locally hosted cloud-based physical security technology SYDNEY โ€“ August 20, 2024 โ€“ Genetec Inc. (โ€œGenetecโ€), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced that Genetecโ„ข Security Center SaaS will be hosted in Australia on the ...
Post-Quantum Cryptography Algorithms: Thales Warns Organisations That The Transition To PQC Requires Careful Preparation

Post-Quantum Cryptography Algorithms: Thales Warns Organisations That The Transition To PQC Requires Careful Preparation

ThaPost Quantum Cryptography (PQR) is soon going to put an end to the encryption foundations we have relied upon for decades, forcing organisations to completely rethink how they approach digital security. There's been one more step in this post-quantum world becoming a reality earlier this week, with the National Institute of Standards and ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This