The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Recorded Futureโs Monthly CVE Report Records 2,200 Cyber Vulnerabilities for April, Microsoft Still Topping the List
Australian organisations should pay attention to 15 high risk vulnerabilities across Microsoft, Apple and Google. Some of the vulnerabilities in Apple and Microsoft are being used by the Nokoya ransomware group and likely nation-state actors.
The Microsoft Azure service that had 80 vulnerabilities in one year
As the range of cloud services on offer grows, one might expect a corresponding increase in vulnerabilities - but for Microsoft, one cloud service experienced a disproportionately high number compared to others, writes James Maude, Lead Cyber Security Researcher, BeyondTrust.
Fortinet survey finds 78 per cent of organisations felt prepared for ransomware attacks, yet half still fell victim
John Maddison, executive vice president of products and chief marketing officer, Fortinet, said, โAccording to the Fortinet research released, though three out of four organisations detected ransomware attacks early, half still fell victim to them. These results demonstrate the urgency to move beyond simple detection to real-time response. However, ...
New Relicโs 2023 State of Java Ecosystem Report: Java Still Dominant
New Relicย (NYSE: NEWR),ย the all-in-one observability platform for every engineer,ย released its second annual State of the Java Ecosystem Report to provide context and insights into the current state of the Java ecosystem. Following the recent release of Java 17, the report finds that the adoption rate for the latest long-term support (LTS) release has ...
Report Reveals the Need for the Convergence of Observability and Security as Rising Complexity of Cloud-Native Development Exposes Australian Organisations to Heightened Security Risks
Dynatraceย (NYSE: DT), the leader in unified observability and security, has announced the findings of an independent global survey of 1,300 chief information security officers (CISOs), including 100 respondents from Australia, in large organisations.ย The research reveals that CISOs find it increasingly difficult to keep their software secure as their ...
New Research Underscores Security and Compliance Challenges Remain Across Distributed Workforces
Report reveals OS fragmentation, endpoint and network complexity creating false sense of security for enterprises
Asset Deployment and the Changing Face of Mining
As an industry, mining has always been slow to adopt new ideas due to the enormous upfront investment in capital. It is clear, however, that new approaches are required to transform operations because of the pressure on margins and the need to extract raw materials more efficiently and cheaper than competitors. The mining sector is experiencing a ...
New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats
Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.
In The News
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 extends its security operations platform to unlock more accessible and accurate asset inventory for better security outcomes
ManageEngine Study Reveals Insufficient Visibility Into Business Processes and Infrastructure Automation in Australian SMEs
ManageEngine, today unveiled the findings of its comprehensive Digital Intensity in Australia Study,ย conducted by technology advisory firm, Ecosystm. As market competition increases, small to midsize enterprises (SMEs) in Australia are shifting to modern technology infrastructure to maintain their competitive edge. However, this surge in digital ...
Elastic Introduces Playground to Accelerate RAG Development with Elasticsearch
A new interface enables developers to iterate and build RAG applications for A/B testing LLMs, tuning prompts and chunking data
AUSCERT Launches New Maturity Assessment Service To Help Organisations Improve Cybersecurity Posture
AUSCERT General Manager, Dr Ivano Bongiovanni, says the new Maturity Assessment Service will enable organisations of all sizes to take proactive steps to enhance their cybersecurity posture and mitigate cybersecurity risks.ย
Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16%
Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16%
Additional findings of high expected AI adoption growth suggests data utilisation is key to increasing visibility
Camelot Secure CEO Stanford Oliver Wins 2024 Fortress Cybersecurity Leadership Award
Camelot Secure CEO Stan Oliver was named a winner in the Leadership category by the prestigious 2024 Fortress Cybersecurity Awards. Stanโs submission rose to the top of the judgesโ evaluations in part as a result of his pioneering leadership, innovative cybersecurity solutions, dedication to educational advancements, and ability to quickly overcome ...
Fortinet annual skills gap report reveals growing connection between cybersecurity breaches and skills shortages
Nearly 90 per cent of organisations experienced a breach in the last year that they can partially attribute to a lack of cyber skills, and 70 per cent attribute increased cyber risks to the skills gap
Oracle Announces Industry First In-Database LLMs and an Automated In-Database Vector Store with HeatWave GenAI
Customers can build generative AI applications without AI expertise, data movement, or additional cost.
HeatWave GenAI is 30X faster than Snowflake, 18X faster than Google BigQuery, and 15X faster than Databricks for vector processing
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..