The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review
The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by ...
Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure
Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape
The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report
Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk
Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats
Why 2023 is the Year to Implement a Zero-Trust Strategy
Ask a group of IT security professionals to give their opinion on zero trust and youโre likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a โmust haveโ strategy that can aid the battle against cyberattacks.
How to establish a โsecurity-awareโ business culture
When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck.
ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion
New Research Highlights Uncertainty Around XDR Definition, Implementation and Resources Needed
More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking
Alarmingly, more than 1 in 5 Aussies surveyed have fallen victim to an online dating/romance scam.
In The News
SentinelOneยฎ Recognised as a 2024 Gartner Peer Insightsโข Customersโ Choice for Endpoint Protection Platforms
MOUNTAIN VIEW, CA - July 2, 2024 - When it comes to Endpoint Protection Platforms (EPP), customers have plenty of choices. And theyโre choosing SentinelOne (NYSE: S). The global leader in AI-powered security today announced that it is once again among the highest-rated vendors in the Gartner Peer Insightsโข Voice of the Customer for Endpoint Protection ...
Optus And Cisco Expand Partnership To Offer Strengthened Protection For Business Customers And Hybrid Workforce
โ Optus Secure Managed Network Services will provide a portfolio of network security services powered by Cisco.
โ Upgrade of the Optus Secure Network Operation Centre and a suite of new Cisco products will enhance network security for office-based customers and those with a hybrid workforce.
Rapid7 Completes IRAP PROTECTED Assessment
Rapid7 has announced the successful completion of an Information Security Registered Assessors Program (IRAP) assessment to the PROTECTED Level for key solutions within the Rapid7 Insight Platform.
Australian Government agencies can access the Rapid7 Insight Platform to keep pace with dynamic cloud environments and tackle an expanding attack surface
LogRhythmโs Machine Data Intelligence Fabric Empowers AI-Ready Organisations to Enter the Modern Era with Confidence
BROOMFIELD, Colo.โJuly 1, 2024โLogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its ninth consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to enhance the output of ...
Motorola Solutions Acquires Noggin, a Global Provider of Critical Event Management Software
Motorola Solutions has acquired Noggin, a global provider of cloud-based business continuity planning, operational resilience and critical event management (CEM) software. The company is headquartered in Sydney, Australia, with a global footprint of customers.
Nogginโs software helps enterprises and critical infrastructure anticipate, prepare for ...
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 extends its security operations platform to unlock more accessible and accurate asset inventory for better security outcomes
ManageEngine Study Reveals Insufficient Visibility Into Business Processes and Infrastructure Automation in Australian SMEs
ManageEngine, today unveiled the findings of its comprehensive Digital Intensity in Australia Study,ย conducted by technology advisory firm, Ecosystm. As market competition increases, small to midsize enterprises (SMEs) in Australia are shifting to modern technology infrastructure to maintain their competitive edge. However, this surge in digital ...
Elastic Introduces Playground to Accelerate RAG Development with Elasticsearch
A new interface enables developers to iterate and build RAG applications for A/B testing LLMs, tuning prompts and chunking data
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..