The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

New Research Underscores Security and Compliance Challenges Remain Across Distributed Workforces

New Research Underscores Security and Compliance Challenges Remain Across Distributed Workforces

Report reveals OS fragmentation, endpoint and network complexity creating false sense of security for enterprises
Asset Deployment and the Changing Face of Mining

Asset Deployment and the Changing Face of Mining

As an industry, mining has always been slow to adopt new ideas due to the enormous upfront investment in capital. It is clear, however, that new approaches are required to transform operations because of the pressure on margins and the need to extract raw materials more efficiently and cheaper than competitors. The mining sector is experiencing a ...
New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats

New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats

Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.
Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted

Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted

Annual Phishing Report Highlights New and Evolving Phishing Campaigns Resulting from the Rise of AI Platforms, like ChatGPT, Urges Organisations to Adopt a Zero Trust Architecture
How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

Amidst an environment of ever-increasing digital threats, growing numbers of organisations are turning to cyber insurance as a means of protecting against the fallout from attacks.
60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

As cloud adoption continues to surge, with a projected market size of $830 billion in 2025, threat actors are increasingly targeting common vulnerabilities in the cloud.
Why SaaS Security Needs to Receive Constant Attention

Why SaaS Security Needs to Receive Constant Attention

ured by the promise of lower operating costs and improved flexibility, many businesses are continuing to increase their usage of software-as-a-service (SaaS) offerings.
Telecommunications Asset Deployments

Telecommunications Asset Deployments

The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives. The foundational infrastructure that allows the communication between devices and the collection of this data for processing and interpretation ...

In The News

Businesses Believe Collaboration Is Key To Beating Identity Fraud, With Australia Looking To Govt For Clear Standards

Businesses Believe Collaboration Is Key To Beating Identity Fraud, With Australia Looking To Govt For Clear Standards

GBGโ€™s Global Fraud Report surveyed over 520 businesses in APAC to reveal how they are fighting fraud: - 81% of APAC businesses believe cross-sector collaboration and intelligence sharing is key to beating fraudsters. - Almost a quarter of Australian businesses think our government is not doing enough to help them fight fraud. Further, with 98.9% of ...
Secure Code Warrior Introduces Industry-first Solution that Measures Developersโ€™ Security Competencies for Code Commits

Secure Code Warrior Introduces Industry-first Solution that Measures Developersโ€™ Security Competencies for Code Commits

New SCW Trust Agent facilitates a Secure-by-Design approach for enterprises; equips security leaders with unparalleled visibility into their organisationsโ€™ software security posture.
JFrog to Acquire Qwak to Streamline AI Models from Development to Production

JFrog to Acquire Qwak to Streamline AI Models from Development to Production

JFrog Ltd.ย (Nasdaq: FROG), the Liquid Software company and creators of theย JFrog Software Supply Chain Platformย that offers DevOps and DevSecOps solutions, today announced it has entered into a definitive agreement to acquireย Qwak AI Ltd., creators of the AI and MLOps platform. With the acquisition, JFrog aims to offer a unified and scalable ...
Canberra College De-Risks Information Management And Strengthens Compliance With Castlepoint

Canberra College De-Risks Information Management And Strengthens Compliance With Castlepoint

Radford College introduces Castlepoint to create single view of sensitive data and PII, forming a baseline for its information management framework
Infoblox Exposes: Chinese Cybercrime Syndicate Linking European Football Sponsors, Human Trafficking and a Trillion-Dollar Illegal Gambling Economy

Infoblox Exposes: Chinese Cybercrime Syndicate Linking European Football Sponsors, Human Trafficking and a Trillion-Dollar Illegal Gambling Economy

Infoblox has exposed Vigorish Viper, a Chinese cybercrime syndicate using sophisticated technology to take advantage of the AU$2.5 trillion illegal gambling economy, with links to money laundering and human trafficking operations across Southeast Asia. Research reveals that Vigorish Viper has been central to the sponsorship controversy surrounding ...
Konica Minolta Australia Releases 2024 Australian IT Trends: Driving Digital Transformation Report, Revealing 68 Per Cent Of Australian Executives Prioritise Improving Operational Efficiencies

Konica Minolta Australia Releases 2024 Australian IT Trends: Driving Digital Transformation Report, Revealing 68 Per Cent Of Australian Executives Prioritise Improving Operational Efficiencies

23 July, 2024 โ€” Konica Minolta Australia has released its 2024 Australian IT trends: Driving digital transformation report, revealing valuable insights into the current trends, challenges, and opportunities in the Australian IT market.ย  Konica Minolta Australia and CoreData surveyed 200 IT decision-makers across Australia in April 2024, capturing ...
SolarWinds Receives Global Recognitions for Powerful IT Management Solutions and Industry Excellence

SolarWinds Receives Global Recognitions for Powerful IT Management Solutions and Industry Excellence

CRN, CSO, Fortress Cybersecurity Award, and others honoring SolarWinds products, solutions, and executives in first half of 2024
Revolver Rabbitโ€™s Million-Dollar Masquerade: Infoblox Uncovers The Hidden World of RDGAs

Revolver Rabbitโ€™s Million-Dollar Masquerade: Infoblox Uncovers The Hidden World of RDGAs

Sydney, Australia, July 18, 2024 - Infoblox Threat Intel released a threat landscape study of the use of registered domain generation algorithms (RDGAs) by malicious actors today. An RDGA differs from the traditional malware domain generation algorithm (DGA) in that all the domains are registered. Infoblox was the first to describe the technique ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This