The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...
Can Being “Compliant” Ever Top Being “Secure”?

Can Being “Compliant” Ever Top Being “Secure”?

My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
A Look Inside a Cybercriminal Execution Chain

A Look Inside a Cybercriminal Execution Chain

During a cyber attack, the process of compromising a machine rarely involves a single step.
The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
Unlocking Opportunities: Australian Talent in the US Job Market

Unlocking Opportunities: Australian Talent in the US Job Market

A Conversation with Amy Meyer, Founder from Aussie Recruit on Overcoming Challenges and Thriving in the US
Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity

Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity

In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances. Small to medium sized players have been under particular pressure, according to accountancy firm Grant Thornton’s The State of Australian Manufacturing: ...
The Social Responsibility of Data Security

The Social Responsibility of Data Security

Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...
Soczilla Roadshow Launches in Australia and New Zealand

Soczilla Roadshow Launches in Australia and New Zealand

Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney. The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
No results found.

In The News

Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected

Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected

Organisations are reassessing their cybersecurity budget allocations after taking 5.9 months to recover from incidents in 2024 - over a month longer than expected
Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available

Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available

As the digital landscape grows increasingly interconnected, defenders face a critical challenge: the data and insights from various security tools are often siloed or, at best, loosely integrated. This fragmented approach makes it difficult to gain a holistic view of threats or assess their potential impact on critical assets. In a world where a single ...
Thales Expands CipherTrust Data Security Platform as-a-Service Offerings

Thales Expands CipherTrust Data Security Platform as-a-Service Offerings

CipherTrust Transparent Encryption helps organisations meet compliance mandates and protect data wherever it resides New Cloud Service includes Live Data Transformation for non-disruptive encryption and Ransomware Protection to monitor continuously for abnormal activity
Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus ...
Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report

Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report

Genetec bolsters #2 global ranking with six consecutive years of organic growth
OpenText Launches New Partner Enterprise Learning Subscription

OpenText Launches New Partner Enterprise Learning Subscription

New program helps Partners build skills and gives customers confidence in their Partner choice 
The Dark Side of Domain-Specific Languages: Tenable Uncovers New Attack Techniques in Open Source Software

The Dark Side of Domain-Specific Languages: Tenable Uncovers New Attack Techniques in Open Source Software

Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has uncovered new attack techniques in Domain-Specific Languages (DSLs) of popular policy-as-code (PaC) and infrastructure-as-code (IaC) platforms. These can lead to compromised cloud identities, lateral movement, and data ...
OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

 Next-generation cloud, security, AI-integrated innovations unveiled at OpenText World 2024  About OpenText OpenText, The Information Company™, enables organisations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions. For more information about OpenText (NASDAQ: OTEX, TSX: OTEX) ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This