The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

IoT Software vulnerability in the IKEA TRร…DFRI smart lighting system

IoT Software vulnerability in the IKEA TRร…DFRI smart lighting system

Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRร…DFRI smart lighting system.
What is a โ€˜Denial of Serviceโ€™ software vulnerability and what impact could it have on you?

What is a โ€˜Denial of Serviceโ€™ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsysย Cybersecurity Research Center Theย Synopsysย Cybersecurity Research Center (CyRC) recently published aย vulnerability advisory related to Open5GS,ย which is full of dense technical detail. But what does it all mean for organizations? Whatโ€™s the potential impact? To answer that, letโ€™s take a step ...
Why You Should Care About the Optus Breach If Youโ€™re A Customer

Why You Should Care About the Optus Breach If Youโ€™re A Customer

By now, youโ€™ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning โ€˜Shell Houseโ€™ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-itยฎย Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, Iโ€™m willing to bet remote workers have passwords written down everywhere ...
What Iโ€™ve Learnt as an Entrepreneur

What Iโ€™ve Learnt as an Entrepreneur

A few things Iโ€™ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what Iโ€™ve learnt so far.

In The News

Infoblox Threat Intel Discovers Muddling Meerkat, a DNS Operation Controlling Chinaโ€™s Great Firewall

Infoblox Threat Intel Discovers Muddling Meerkat, a DNS Operation Controlling Chinaโ€™s Great Firewall

Infoblox Inc., a leader in cloud networking and security services, today announced that its threat intel researchers, in collaboration with external researchers, have uncovered โ€˜Muddling Meerkatโ€™, a likely People's Republic of China (PRC) state actor with the ability to control the Great Firewall (GFW) of China, a system that censors and manipulates ...
Proofpoint: 59% of ASX 200 Companies at Risk of Email Fraud

Proofpoint: 59% of ASX 200 Companies at Risk of Email Fraud

Australian organisations lag behind global counterparts in basic email protection, Proofpoint analysis reveals
The Australian Organisations Looking to Generative AI to Boost Security Operations

The Australian Organisations Looking to Generative AI to Boost Security Operations

AustralianSuper, Powerlink Queensland and TAL among the first organisations exploring Microsoftโ€™s Copilot for Security to enhance defence capabilities
Fastly Recognised as a Gartnerยฎ Peer Insightsโ„ข Customersโ€™ Choice for Cloud Web Application and API Protection for Sixth Consecutive Year

Fastly Recognised as a Gartnerยฎ Peer Insightsโ„ข Customersโ€™ Choice for Cloud Web Application and API Protection for Sixth Consecutive Year

SAN FRANCISCO โ€“ April 29, 2024 โ€“ Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, today announced it was named a 2024 Gartnerยฎ Peer Insightsโ„ข Customersโ€™ Choice for Cloud Web Application and API Protection (WAAP) for the sixth consecutive year โ€“ and the only vendor to be recognised for six years running. Based on reviews from ...
Logicalis Australia Appoints John Griffin As Chief Technology Officer

Logicalis Australia Appoints John Griffin As Chief Technology Officer

Melbourne,โ€ฏAustraliaโ€ฏโ€“ 29 April 2024:ย Logicalis Australia, a leading global technology services provider, has announced the appointment of John Griffin as chief technology officer (CTO) in a strategic move that underscores the organisation's commitment to innovation and excellence in the rapidly evolving IT landscape. John brings a wealth of ...
Zscaler Introduces First of Its Kind Digital Experience Monitoring Copilot to Enable IT Support and Operations with AI

Zscaler Introduces First of Its Kind Digital Experience Monitoring Copilot to Enable IT Support and Operations with AI

Zscaler Digital Experience (ZDX) Copilot effortlessly unlocks network, device, and application performance insights in real-time to help quickly resolve issues impacting end users
SolarWinds Launches Consultative Sales Model to Help Customers Maximise Value of ITSM Solutions

SolarWinds Launches Consultative Sales Model to Help Customers Maximise Value of ITSM Solutions

SolarWinds is a leading provider of simple, powerful, secure observability and IT management software. The company has unveiled a groundbreaking new consultative approach to maximise the value of IT service management (ITSM) solutions for enterprises without the burdensome costs and staffing requirements typically associated with high-level IT ...
Github: Securing Millions Of Developers Through 2FA

Github: Securing Millions Of Developers Through 2FA

GitHub, the worldโ€™s leading AI-powered developer platform, has released the early results of its two-factor authentication (2FA) requirements for code contributors on GitHub.comโ€“which was first announced in 2022 and rolled out across 2023โ€“in efforts to secure developer accounts and prevent the next supply chain attack. Over the last two years, it has ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This