The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

91% of Australian respondents experienced at least one ransom attack
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.ย  Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.ย  This event was hosted ...
Why Outdated Anti-Phishing Advice Leaves You Exposed โ€“ Stories from the Trenches (Part 2)

Why Outdated Anti-Phishing Advice Leaves You Exposed โ€“ Stories from the Trenches (Part 2)

As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you from becoming a victim. High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. In the following article, we will showcase a range of real-world phishing ...
Why Outdated Anti-Phishing Advice Leaves You Exposed โ€“ Stories from the Trenches (Part 1)

Why Outdated Anti-Phishing Advice Leaves You Exposed โ€“ Stories from the Trenches (Part 1)

We already know that phishing is a significant threat to businesses and individuals. Anti-phishing tips, such asย โ€œalways hover over the link in an email before clickingโ€ย orย โ€œbe wary of emails with poor grammarโ€, are meant to help us avoid being tricked by phishing emails. These tips have been circulating on the internet for over a decade, but sadly, ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...

In The News

Microsoft Strengthens Phishing-Resistant Security For Entra ID With FIDO2 Provisioning APIs

Microsoft Strengthens Phishing-Resistant Security For Entra ID With FIDO2 Provisioning APIs

Yubico hasย worked closelyย with Microsoft for over a decade to keep businesses around the world and the Microsoft solutions they use both secure and phishing-resistant. Recognising the importance of multi-factor authentication (MFA), Microsoft recentlyย mandatedย that MFA be used by all Azure users โ€“ a critical move to require stronger authentication for ...
Cloudian and Supermicro Come Together to Enhance AI Infrastructure

Cloudian and Supermicro Come Together to Enhance AI Infrastructure

Cloudian and Supermicro today announced a strategic collaboration to deliver a groundbreaking data management solution designed to simplify and accelerate large-scale AI implementations. This comprehensive solution integrates exabyte-scalable storage and GPU-based computing to accelerate and simplify AI deployment in data-intensive use cases such as ...
Camelot Secureโ€™s Myrddin (Cybersecurity Maturity Model Certification (CMMC) Bot Assistant) Wins 2024 CSO Award

Camelot Secureโ€™s Myrddin (Cybersecurity Maturity Model Certification (CMMC) Bot Assistant) Wins 2024 CSO Award

In its second year of being recognized by the CSO Awards program, Camelot was honored for Myrddin, which integrates Natural Language Processing (NLP) technologies and the latest AI Generative Pretrained Transformer (GPT) to assist IT personnel in conducting CMMC gap assessments in a secure environment.
60 Hurts per Second โ€“ How We Got Access to Enough Solar Power to Run the United States

60 Hurts per Second โ€“ How We Got Access to Enough Solar Power to Run the United States

The electricity grid โ€“ the buzzing, crackling marvel that supplies the lifeblood of modernity โ€“ is by far the largest structure humanity ever built. Itโ€™s so big, in fact, that few people even notice it, like a fish canโ€™t see the ocean.   Until the grid goes down, that is. Then, like the fish dangling from the anglerโ€™s hook, we see our ...
Fortinet Enhances The Industryโ€™s Most Comprehensive Operational Technology Security Platform To Protect Cyber-Physical Systems

Fortinet Enhances The Industryโ€™s Most Comprehensive Operational Technology Security Platform To Protect Cyber-Physical Systems

Updates across the Fortinet OT security platform include new ruggedised appliances, advanced secure networking and security operations capabilities, and expanded partnerships with leading OT vendors
2024 Qualys Midyear Threat Landscape Review

2024 Qualys Midyear Threat Landscape Review

According to the Qualys 2024 Midyear Threat Landscape Review: The number of reported Common Vulnerabilities and Exposures (CVEs) rose by 30% in the last year to 22,254. These numbers reflect rising software complexity and the broader use of technology, necessitating advanced and dynamic vulnerability management strategies to mitigate evolving ...
Rapid7 Ransomware Radar Report Charts Ransomware Group Activity and Methodologies for Fresh Insights

Rapid7 Ransomware Radar Report Charts Ransomware Group Activity and Methodologies for Fresh Insights

New research from Rapid7 analyses more than 70 active ransomware groups, 21 of which were new in 2024. The Ransomware Radar Report provides a fresh perspective on the globalย ransomware threat by analysing, comparing, and contrasting attacker activity and techniques over an 18-month period ending June 30, 2024.
Infoblox Unveils New Ecosystem Program to Boost Enterprise Security and Enhance Network Visibility with Certified Integrations

Infoblox Unveils New Ecosystem Program to Boost Enterprise Security and Enhance Network Visibility with Certified Integrations

Infoblox today unveiled its new Infoblox Ecosystem Program. Key to the program is a self-service portal that features certified out-of-the-box integrations for leading technology providers. Infoblox-certified integrations undergo rigorous testing, optimisation, validation, and ongoing updates to ensure seamless compatibility, and are backed by support ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This