The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australia’s finance sector needs

PAM may be the infosec pressure relief valve Australia’s finance sector needs

Information security is a journey, but calls of, ‘Are we there yet?’ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.
DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.
Four steps organisations can take to improve cybersecurity awareness

Four steps organisations can take to improve cybersecurity awareness

October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).
Five common challenges with securing cloud-based applications

Five common challenges with securing cloud-based applications

The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.
The overlap between physical and digital security – how to get smart with compliance

The overlap between physical and digital security – how to get smart with compliance

Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of ...
Espionage Fuels Global Cyberattacks

Espionage Fuels Global Cyberattacks

In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
No results found.

In The News

Trustwave’s 2024 Retail Report Series Highlights Alarming e-Commerce Threats And Growing Fraud Against Retailers

Trustwave’s 2024 Retail Report Series Highlights Alarming e-Commerce Threats And Growing Fraud Against Retailers

October 30, 2024 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues.  In its annual research, Trustwave SpiderLabs highlights the unique factors at play in ...
TeamViewer Launches New AI-Powered Features Following Research Finding 75 Per Cent Of Global Decision-Makers Find AI Essential For Business Efficiency

TeamViewer Launches New AI-Powered Features Following Research Finding 75 Per Cent Of Global Decision-Makers Find AI Essential For Business Efficiency

61 per cent of decision-makers agree that the AI hype is over, emphasising the need for actionable solutions that deliver business results. One-quarter of respondents believe that not adopting AI risks falling behind competitors and foresee increased costs due to a lack of automation. AI helps IT professionals save around 16 hours each month already, ...
Ping Identity’s YOUniverse 2024 Celebrates the Future of Identity

Ping Identity’s YOUniverse 2024 Celebrates the Future of Identity

Annual conference focused on streamlined digital experiences and preventing identity fraud with AI
Veeam Announces Update to Veeam Backup for Salesforce on Salesforce AppExchange, Further Strengthening #1 Data Resilience Capabilities

Veeam Announces Update to Veeam Backup for Salesforce on Salesforce AppExchange, Further Strengthening #1 Data Resilience Capabilities

Veeam® Software, the #1 leader by market share in Data Resilience, today announced it has updated Veeam Backup for Salesforce on Salesforce AppExchange, a leading enterprise marketplace for partner apps and experts. Veeam Backup for Salesforce ensures customers’ CRM data is resilient, secure and accessible. The solution eliminates the risk of data ...
Extreme Networks Raises the Bar for Simple, Secure Network Access with New Enhancements to ExtremeCloud Universal ZTNA

Extreme Networks Raises the Bar for Simple, Secure Network Access with New Enhancements to ExtremeCloud Universal ZTNA

Easy application discovery, policy evaluation and troubleshooting further simplify management for IT and help ensure frictionless user experiences
Trend Micro ZDI Hosts Hacking Contest for Vulnerabilities in AI-Enabled Devices

Trend Micro ZDI Hosts Hacking Contest for Vulnerabilities in AI-Enabled Devices

Pwn2Own Ireland underscores Trend’s commitment to securing AI innovations
Quadrant Unveils Free Dark Web Reports That Reveal A Company’s Leaked Information And Credentials Sitting On The Dark Web

Quadrant Unveils Free Dark Web Reports That Reveal A Company’s Leaked Information And Credentials Sitting On The Dark Web

Quadrant's Free Dark Web Reports provide a proactive solution for identifying and addressing compromised credentials related to specific organizations. This service lets customers access monthly reports highlighting any newly discovered leaked information. These reports enable organizations to take swift action to secure their environments, such as ...
SecurityBridge Launches Automated Virtual Patching to Safeguard SAP Systems

SecurityBridge Launches Automated Virtual Patching to Safeguard SAP Systems

Virtual Patching is a cross-platform solution that integrates SecurityBridge’s Patch Management and Threat Detection modules. It offers seamless, real-time defense against vulnerabilities by alerting SAP administrators when unpatched code is detected. The solution protects affected SAP systems until official patches are implemented, allowing ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This