The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
โCloud engagedโ CEOs are key to Australiaโs multi-cloud maturity
New global research from VMware reveals CEOโs link to cloud maturity and related business benefits among companies in Australia and across the region.
Lack of IT Skills Greatest Data Security Challenge Australian Enterprises Face โ Rubrik Zero Labs
Rubrik, the Zero Trust Data Securityโข Company, today announced the Australian findings from its inaugural State of Data Security report, commissioned by Rubrik and conducted by Wakefield Research. Among the key findings regarding the most pressing challenge Australian cybersecurity leaders face in securing their organisationโs data was โinsufficient ...
Progress Survey Reveals Roadblocks to DevSecOps Success in Australia, Shares Factors Driving DevSecOps Evolution for Next Two Years
60% of Australian respondents across 500+-employee organisations admit that they donโt fully understand how security fits into DevSecOps.
Mandiant releases cyber security forecast for 2023
Mandiantโs Cyber Security Forecast 2023 has provided an overview of the cyber security landscape in 2022, and offered forecasts for likely trends in 2023.
A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.
For The Sake Of Its Cybersecurity, Australia Must Come Together
The Pandemic Has Exacerbated Existing Security Problems
As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responsesย alsoย had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...
Tackling Australiaโs Evolving Threat Landscape โ Zscaler
The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...
The Air Gap is Dead – Itโs Time for Industrial Organisations to Embrace the Cloud
The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...
In The News
Australian Businesses Are Betting On AI In The Face of Customer Churn
Ninety-seven percent of Australian businesses are looking to AI for enhanced customer experience despite 95% still harbouring fears over the technology, Genesys research reveals.
Report: 99% Of Australian Organisations Had Two or More Identity-Related Breaches in the Past Year
Australia ranks second most breached nation surveyed for occurrences of credentials theft, 3rd party and supply chain breaches, as digital transformation shared as most likely cause of breach, ahead of geo-political/state actors
99% of Australian organisations expect negative impact from using AI powered tools on cybersecurity in the next year
...
Joe Levy Appointed CEO of Sophos
Sophos hasย today announced that Joe Levy is now chief executive officer (CEO) of the company. Levy has been acting CEO since Feb. 15. To drive a critical role in the execution of his strategy to shape the future of Sophos, Levy has named Jim Dildine Sophosโ new chief financial officer (CFO) and a member of his senior management team.
Levy is a ...
Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server
Tenable Research has discovered a critical memory corruption vulnerability in Fluent Bitโs built-in HTTP server that could potentially result in denial of service (DoS), information leakage, or remote code execution (RCE). The issue was reported to the projectโs maintainers on April 30, 2024. Fixes were committed to the projectโs main branch on May 15 ...
SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP
New Dashboard Provides a Customized, At-A-Glance View of the Entire SAP Security Landscape
Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks
SYDNEY, Australia, 16 May 2024ย โ Palo Alto Networks, the global cybersecurity leader, announced today that Australian telecommunications provider, Superloop, has achieved Palo Alto Networksโ MSSP accreditation for Prisma SASE. This accreditation underscores Superloopโs proven expertise in delivering SD-WAN and Cloud Security Services.
To obtain this ...
Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident
"It's important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and mitigate operational risks.ย
Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques
Kinsing malware has previously been seen targeting Linux-based cloud infrastructures, now hitting Apache Tomcat servers
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..