The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint has published itsย Julyย Cyber Threat Intelligence Indexย which shows Australia was in the top 10 countries for ransomware attacks last month.
Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Report underscores that email is the most exploited threat vector, Phishing remains borderless and attackers are increasingly impersonating trusted name brands
Achieving a Robust Zero Trust Environment

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but whatโ€™s less clear is the path organisations need to follow to get there.
How Businesses Today can Prevent Advanced Cyber Threats

How Businesses Today can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.
Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...
Doing more with less: the three key focus areas for cybersecurity

Doing more with less: the three key focus areas for cybersecurity

In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.
Bitdefender releases macOS Threat Landscape Report

Bitdefender releases macOS Threat Landscape Report

Bitdefender has revealed at Black Hat USA 2023 the macOS Threat Landscape Report, which looks at the top threats and trends targeting Appleโ€™s macOS operating system over the duration of 12 months.
CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region

CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region

Adversaries took just 79 minutes, on average, to โ€˜breakoutโ€™ of their initial beach head into a victimโ€™s system, with fastest recorded time being just seven minutes.

In The News

Tenable Enhances Nessus Risk Prioritisation To Help Customers Expose And Close Exposures – Integration of EPSS Into Tenable Exposure Solutions Ensures Compliance And Accelerates Prioritisation Efforts

Tenable Enhances Nessus Risk Prioritisation To Help Customers Expose And Close Exposures – Integration of EPSS Into Tenable Exposure Solutions Ensures Compliance And Accelerates Prioritisation Efforts

Tenableยฎ, the exposure management company, today announced new risk prioritisation and compliance features forย Tenable Nessus, the #1 vulnerability assessment solution in accuracy, coverage and adoption. Nessus supports new and updated vulnerability scoring systems โ€“ Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System ...
ManageEngine to Host CyberCon Roadshow 2024 In Australia And New Zealand

ManageEngine to Host CyberCon Roadshow 2024 In Australia And New Zealand

ManageEngine will provide deep insights on cybersecurity trends and IT management solutions
Veeam Expands Worldโ€™s #1 Data Resilience Solution For Microsoft 365

Veeam Expands Worldโ€™s #1 Data Resilience Solution For Microsoft 365

Already protecting 21 million Microsoft 365 users, Veeam Backup for Microsoft 365 v8 delivers comprehensive immutabilityย and enterprise-scale capabilities
Check Point Software Unveils New MSSP Portal For Partners: Vastly Simplifying Service Delivery And Ease Of Doing Business

Check Point Software Unveils New MSSP Portal For Partners: Vastly Simplifying Service Delivery And Ease Of Doing Business

Sydney, 4 September 2024 - Check Pointยฎ Software Technologies Ltd. (NASDAQ: CHKP), a leading cyber security platform provider of AI-powered, cloud delivered solutions, has unveiled its innovative Portal designed for both managed security service providers (MSSPs) and distributors. This platform significantly simplifies service delivery and enhances the ...
Perils In The Periphery – Forescout’s 2024 H1 Threat Review

Perils In The Periphery – Forescout’s 2024 H1 Threat Review

Forescout published its โ€œ2024H1 Threat Reviewโ€. The new report reviews the current state of vulnerabilities, threat actors, and ransomware attacks in the first half of 2024 and compares them to H1 2023. โ€œAttackers are looking for any weak point to breach IT, IoT, and OT devices, and organisations that donโ€™t know what they have connected to their ...
Fortinet Partners With Police Veterans Victoria To Offer Cybersecurity Training To Police Veterans

Fortinet Partners With Police Veterans Victoria To Offer Cybersecurity Training To Police Veterans

Fortinet reaffirms its commitment to train one million people in cybersecurity by 2026 through a first-of-its-kind partnership to equip Victoria Police veterans with essential cybersecurity skillsย 
F5 Collaborates With Intel To Simplify The Security And Delivery Of AI Services

F5 Collaborates With Intel To Simplify The Security And Delivery Of AI Services

Enhancing the protection and performance of enterprise AI inference solutions with F5 NGINX Plus, Intel OpenVINO, and Intel IPUs
Elastic Announces Open Source License For Elasticsearch And Kibana Source Code

Elastic Announces Open Source License For Elasticsearch And Kibana Source Code

OSI-approved AGPL license will be added for a subset of Elasticsearch and Kibana source code

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This