The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

For The Sake Of Its Cybersecurity, Australia Must Come Together

For The Sake Of Its Cybersecurity, Australia Must Come Together

The Pandemic Has Exacerbated Existing Security Problems As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responses also had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...
Tackling Australia’s Evolving Threat Landscape – Zscaler

Tackling Australia’s Evolving Threat Landscape – Zscaler

The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...
The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...
Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...
Personal Liability in Cyber – What Can We Expect?

Personal Liability in Cyber – What Can We Expect?

The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability.
Absolute Advances New Era of Resilient Zero Trust

Absolute Advances New Era of Resilient Zero Trust

New 451 Research Report Underscores Need for Resiliency in Zero Trust, Achieved via Integrated Endpoint Security, Secure Access, Network Visibility, and Management
New White Paper from ISACA Delves into Risk Tolerance

New White Paper from ISACA Delves into Risk Tolerance

The first step to addressing the myriad types of risk that need to be managed in an organisation is understanding risk appetite and tolerance. ISACA has released two new resources that offer guidance in both areas: the Using Risk Tolerance to Support Enterprise Strategy white paper and Risk Scenarios Toolkit.
Nozomi Networks-Sponsored SANS Survey Finds Security Defences are Getting Stronger as Cyber Threats to OT Environments Remain High

Nozomi Networks-Sponsored SANS Survey Finds Security Defences are Getting Stronger as Cyber Threats to OT Environments Remain High

Nozomi Networks Inc., the leader in operational technology (OT) and IoT security, today announced the SANS 2022 OT/ICS Cybersecurity Report finds industrial control systems (ICS) cybersecurity threats remain high as adversaries set their sights on control system components. In response, organisations have significantly matured their security postures ...

In The News

Absolute Software Included in Security Services Edge (SSE) Landscape Report by Independent Research Firm

Absolute Software Included in Security Services Edge (SSE) Landscape Report by Independent Research Firm

Absolute Cyber Resilience Capabilities Noted in Report Outlining SSE Top Use Cases
New Trustwave SpiderLabs Research Exposes Unique Cybersecurity Threats Facing Education Industry

New Trustwave SpiderLabs Research Exposes Unique Cybersecurity Threats Facing Education Industry

February 23, 2024 – Trustwave, a leading cybersecurity and managed security services provider, has released comprehensive research uncovering unique cybersecurity threats faced by education institutions. The report, “2024 Education Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies,” explores industry-specific risks and ...
Genetec Introduces Enterprise-Grade, Unified, SaaS Solution

Genetec Introduces Enterprise-Grade, Unified, SaaS Solution

Genetec Inc. ("Genetec"), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced Security Center SaaS. Built with cybersecurity and privacy at its core, the new offering is a massively scalable, open, and unified software as a service solution (SaaS). Combining access control, ...
LogRhythm Appoints Mazen Adnan Dohaji as General Manager and Vice President of Newly Formed Middle East, Turkey, Africa and Asia-Pacific Region

LogRhythm Appoints Mazen Adnan Dohaji as General Manager and Vice President of Newly Formed Middle East, Turkey, Africa and Asia-Pacific Region

Mazen will build on LogRhythm’s successes across the Middle East and Africa to bring cybersecurity experience, insights, and a customer-centric approach to more organisations across Asia-Pacific
Check Point Software Unveils Comprehensive 2024 Security Report, Highlighting Ransomware Surge and AI Defence Innovations

Check Point Software Unveils Comprehensive 2024 Security Report, Highlighting Ransomware Surge and AI Defence Innovations

Highpoints from the report include an analysis on the pervasiveness of ransomware and how defenders are fighting back against AI-powered cyberattacks
2024 Global Threat Report – China Leads In Third-Party Relationship Exploitation; eCrime Breakout Time Drops To 62 Minutes

2024 Global Threat Report – China Leads In Third-Party Relationship Exploitation; eCrime Breakout Time Drops To 62 Minutes

AUSTIN, Texas – February 21, 2024 – CrowdStrike (Nasdaq: CRWD) today announced the findings of the 2024 CrowdStrike Global Threat Report, highlighting a surge in adversaries leveraging stolen identity credentials to exploit gaps in cloud environments and maximize the stealth, speed and impact of cyberattacks. The report also details the biggest threats ...
Arctic Wolf Threat Report Highlights Sharp Rise In Ransom Demands And BEC Incidents: Cybercriminals Continue To Exploit Long-Disclosed Vulnerabilities For Significant Economic Gains

Arctic Wolf Threat Report Highlights Sharp Rise In Ransom Demands And BEC Incidents: Cybercriminals Continue To Exploit Long-Disclosed Vulnerabilities For Significant Economic Gains

Arctic Wolf, a global leader in security operations, today published its annual Arctic Wolf Labs Threat Report. Insights from the report reveal a year filled with cybercrime groups significantly increasing ransom demands, continuing to exploit well-known vulnerabilities that pre-date 2023, and executing business email compromise (BEC) schemes on a ...
SolarWinds to Host APJ Transform Partner Summit, Emphasising Company’s Commitment to Channel Partners

SolarWinds to Host APJ Transform Partner Summit, Emphasising Company’s Commitment to Channel Partners

Bali event brings partners together to hear from SolarWinds executive leadership on partner program updates, product innovations, and ways to accelerate growth

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This