The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity

Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity

In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances. Small to medium sized players have been under particular pressure, according to accountancy firm Grant Thornton’s The State of Australian Manufacturing: ...
The Social Responsibility of Data Security

The Social Responsibility of Data Security

Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...
Soczilla Roadshow Launches in Australia and New Zealand

Soczilla Roadshow Launches in Australia and New Zealand

Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney. The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by ‘Zombie’ APIs

The Security Threat Posed by ‘Zombie’ APIs

Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs). The challenge of ‘zombie APIs’ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
No results found.

In The News

Aussies Brace For A Record-Breaking Shopping Season With Scammers Set To Strike

Aussies Brace For A Record-Breaking Shopping Season With Scammers Set To Strike

With the holiday season just around the corner, Aussies are gearing up for the year’s biggest shopping spree, out to score great deals. Over the six-week lead up to Christmas, shoppers are expected to spend more than $69.7 billion – a significant part of it online, especially during Black Friday and Cyber Monday sales. This year’s Black Friday/Cyber ...
OpenText Cybersecurity Unveils 2024’s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure

OpenText Cybersecurity Unveils 2024’s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure

As cyberattacks grow more insidious, organisations are ramping up cybersecurity investments to defend essential services Sydney, Australia – 31st October 2024 – OpenText (NASDAQ: OTEX), (TSX: OTEX), has revealed its highly anticipated “Nastiest Malware of 2024” list, spotlighting the year’s most notorious cyber threats. Now in its seventh year, ...
Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellence 

Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellence 

Qualys, a leading provider of disruptive cloud-based IT, security and compliance solutions, today announced that its multi-tenant Qualys Cloud Platform was successfully assessed at the ‘PROTECTED’ level by the Infosec Registered Assessors Program (IRAP), an initiative by the Australian Signals Directorate (ASD). This achievement demonstrates that ...
Hunter Versus Spy: Sophos “Pacific Rim” Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China

Hunter Versus Spy: Sophos “Pacific Rim” Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China

Sophos recently released “Pacific Rim,” a report detailing its defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. The attackers used a series of campaigns with novel exploits and customised malware to embed tools to ...
Trend Micro Celebrates Cybersecurity Excellence With Foodstuffs South Island, Accor, Dole, And Others

Trend Micro Celebrates Cybersecurity Excellence With Foodstuffs South Island, Accor, Dole, And Others

New Zealand's leading grocery group, Foodstuffs South Island, has been recognised as a winner of the Customer Innovator Award for integrating security into its digital strategies SYDNEY, November 1, 2024 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the winners of its 2024 Customer Awards. The ...
Forescout Vedere Labs Unveils Riskiest Connected Medical Devices

Forescout Vedere Labs Unveils Riskiest Connected Medical Devices

Forescout today published the “Unveiling the Persistent Risks of Connected Medical Devices” report. Building on “The Riskiest Connected Devices in 2024” report from June, this research analyses more than 2 million devices across 45 healthcare delivery organisations (HDOs) during the last week of May 2024. The findings reveal a growing risk from ...
ExtraHop® Report Reveals Data Breach Costs Exceed Industry Estimates

ExtraHop® Report Reveals Data Breach Costs Exceed Industry Estimates

SEATTLE – October 29, 2024 – ExtraHop®, a leader in cloud-native network detection and response (NDR), today released a new report analysing the short- and long-term financial impacts high-profile data breaches have on publicly traded companies. According to the findings, a data breach costs an organisation US$677 million on average, millions more ...
Fortinet Delivers AI-Enhanced Data Protection And Insider Risk Management

Fortinet Delivers AI-Enhanced Data Protection And Insider Risk Management

FortiDLP’s unified approach to data protection enables enterprise organisations to anticipate and prevent accidental and malicious data loss across cloud deployments, applications, and managed and unmanaged devices 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This