The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data
With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo
It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity
A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.

The Unspoken Voice – CFOs Perspective On Security
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...

Cybersecurity Implications of Cryptocurrency and Blockchain Technology
Introduction
This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...

Can Being “Compliant” Ever Top Being “Secure”?
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?

A Look Inside a Cybercriminal Execution Chain
During a cyber attack, the process of compromising a machine rarely involves a single step.

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024
With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
In The News
Fortinet And National Australia Bank Host Cyber Codefest 2024 To Strengthen Cybersecurity Skills Among TAFE And University Students
Cyber Codefest gives students the opportunity to learn from and network with cybersecurity leaders
OpSys Australia Appoints Shanna Daly as Inaugural Chief Information Security Officer
Cyber Security Expert to Lead and Align the Company’s Cyber Security Strategy with Regional Customer Needs
Sophos Appoints Torjus Gylstorff as Sophos’ Chief Revenue Officer
Sophos today announced that Torjus Gylstorff has joined the company as Chief Revenue Officer (CRO).
Gylstorff is responsible for driving revenue growth through effective leadership of Sophos’ global sales organisation and partner and customer networks. This includes expanding Sophos’ presence beyond its already strong customer base of more than ...
Informatica Delivers Blueprints to Simplify and Accelerate Generative AI Development on Leading Technology Platforms
Informatica (NYSE: INFA), a leader in enterprise AI-powered cloud data management, has announced the availability of Generative AI (GenAI) Blueprints that make it faster and easier for customers to build enterprise-grade GenAI applications on six industry-leading technology platforms.
The blueprints — for AWS, Databricks, Google Cloud, Microsoft ...
F5 to Supercharge AI Application Delivery for Service Providers and Enterprises with NVIDIA BlueField-3 DPUs
F5 BIG-IP Next for Kubernetes, F5’s new intelligent proxy, combined with NVIDIA BlueField-3 DPUs, transforms application delivery for AI workloads
Alkira Launches Zero Trust Network Access (ZTNA) Solution To Simplify End-To-End Secure Connectivity For Enterprises
Leaders in Network Infrastructure as a Service, Alkira, has launched 'Alkira Zero Trust Network Access' (ZTNA), a groundbreaking cloud-based service that redefines secure access from anywhere for the modern enterprise. Alkira ZTNA combines zero trust principles with Alkira's renowned network infrastructure expertise to deliver a unified platform for ...
Fortinet Report Finds Nearly 70 Percent Of Organisations Say Their Employees Lack Fundamental Security Awareness
New research highlights the connection between increased organisation-wide cyber awareness and decreased organisational risk
Thoughtworks Technology Radar Finds Trend In Tools To Simplify LLMs For Practical AI Applications
Thoughtworks (NASDAQ: TWKS), a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today released volume 31 of the Technology Radar, a biannual report informed by Thoughtworks’ observations, conversations and frontline experiences solving its clients’ most complex business challenges.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..