The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Critical Infrastructure and IoT
The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...

Data Centres and Digital Assets
INTRODUCTION
While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data.
By 2025, it is anticipated that there will be over 65 billion active IoT devices ...

Navigating Unique Cybersecurity Challenges in North Africa
The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...

PAM may be the infosec pressure relief valve Australia’s finance sector needs
Information security is a journey, but calls of, ‘Are we there yet?’ are getting louder and more frequent.

Solving the Skills Shortage by Looking Within
Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC
IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.

Four steps organisations can take to improve cybersecurity awareness
October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).

Five common challenges with securing cloud-based applications
The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.
In The News
Forescout Finds 14 Vulnerabilities in Popular DrayTek Routers Affecting Hundreds of Thousands of Exposed Devices Globally
Forescout today published the “DRAY:BREAK” Research Report. The report identifies 14 previously unknown vulnerabilities in routers manufactured by DrayTek, a Taiwanese networking equipment manufacturer, including one with the highest possible severity rating of 10. If left unaddressed, attackers could gain full control over these devices, opening the ...
The 2024 Elastic Global Threat Report: Basic Security Settings Are Easily Exploited by Adversaries
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface
CrowdStrike Expands CrowdStrike Marketplace to Meet Growing Demand for Integrated Cybersecurity Solutions
In its first year, CrowdStrike Marketplace expanded to over 260 listings from 140 partners, adding strategic resellers to help global customers seamlessly discover, try and buy industry-leading third-party solutions integrated with the Falcon platform
Obsidian Security Launches New Australian Data Centre Built on AWS to Strengthen Customer Data Sovereignty
Sydney, Australia, October 2, 2024 - Obsidian Security, the leader in SaaS Security, is proud to support the data sovereignty goals of its Australian customers and extend its reach into the Asia-Pacific region with the launch of a new data centre in Sydney, Australia. Built on Amazon Web Services (AWS), the new platform region is now available, giving ...
SolarWinds Closes the Market’s Hybrid IT Observability Gap, Accelerating Transformations for Customers
The next generation of SolarWinds Observability delivers innovative and comprehensive full-stack visibility across all IT environments—on-premises, cloud, or hybrid—with flexible self-hosted and SaaS deployment options
Sophos Named a Leader in 2024 Gartner Magic Quadrant for Endpoint Protection Platforms
Sophos recently announced that it has once again been named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP). This is the 15th consecutive time that Sophos has been positioned as a Leader in the report.
Sophos’ market-leading endpoint security solutions, including Sophos Intercept X Endpoint, protect more than ...
NetApp Expands Collaboration With Google Cloud to Provide Data Storage For Distributed Cloud Infrastructure
Google Distributed Cloud architecture integrates intelligent data infrastructure to drive secure AI innovation
Extreme Networks Boosts Security Leadership With Industry Expert Hire
David Nuti joins Extreme Networks as Head of Security Sales to help drive Extreme’s leadership in the convergence of networking, security and AI
Morrisville, N.C., October 2, 2024 — Extreme Networks, Inc. (Nasdaq: EXTR), a leader in cloud networking, today announced the strategic hire of seasoned security executive David Nuti as Head of Security ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..