The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)
The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network
Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style
Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning โShell Houseโ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them.
The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...
Security Fatigue: How Public Agencies Can Counter this Silent Menace
Every one of us knows one person or colleague who has a Post-itยฎย Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, Iโm willing to bet remote workers have passwords written down everywhere ...
What Iโve Learnt as an Entrepreneur
A few things Iโve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what Iโve learnt so far.
What Iโve Learnt as an Entrepreneur
A few things Iโve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what Iโve learnt so far.
Australian Public: How to add 2FA
Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. โHow?โ you ask. Well, letโs take a closer look at how it works and how to get it working fast. To keep your online identity as ...
Privacy Has a Business Model Problem
Business growth should not come at the expense of customer privacy. Unfortunately, thatโs not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether itโs Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
In The News
DroneShield Triples Sovereign Defence R&D and Manufacturing Capacity to $400m With New Global Headquarters
DroneShield (ASX:DRO) has opened its new headquarters, tripling its research and development (R&D) and manufacturing capacity to more than AU$400 million in hardware and software per year as the company works to convert a sales pipeline of over $500 million.
The new site is located in Pyrmont, NSW, where the companyโs 120 local staff are based. ...
SentinelOneยฎ and Advantage Partner to Deliver Next-Generation of Managed Detection and Response
Companies unleash power of generative AI to transform security operations across New Zealand
Tenable Research Discovers High Severity Vulnerability in Microsoft Azure – Vulnerability affects more than 10 Azure services and will not be patched
Today, Tenable โ the Exposure Management company, has disclosed that its Tenable Cloud Research Team has discovered a high severity vulnerability in Azure that affects more than 10 Azure services, including Azure Application Insights, Azure DevOps, Azure Machine Learning, Azure API Management and Azure Logic Apps. Microsoft does not plan to issue a ...
Palo Alto Networks Recognises Australian Partners at Ignite On Tour Sydney 2024
SYDNEY, Australia, 31 May 2024 โ Palo Alto Networks, the global cybersecurity leader, announced its Partner of the Year Awards at the NextWave Partner Gala Dinner Awards held last night. The awards recognise the outstanding achievements and contributions of Palo Alto Networksโ partners towards securing the digital future of customers against cyber ...
Ansvar Bolsters Risk Management With Interactive
Leading insurance provider Ansvar modernising technology and compliance with Interactive, for enhanced risk management.
Genetec Expands Global Presence With New R&D Hubs And Experience Centres To Support Rapid Growth
MONTRรAL, May 29, 2024โGenetec Inc. (โGenetecโ), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced the opening of several new R&D hubs, Experience Centres, and the expansion of several offices around the world.
New R&D Hubs
Underscoring its commitment to ...
Newgen Launches LumYn – World’s First AI-Powered Hyper-Personalisation Platform for Banks
Newgen Launches LumYn - World's First AI-Powered Hyper-Personalisation Platform for Banks. Aiming to transform the Banking Industry with 2X More Conversions and 10X Faster Targeted Product Launches
Discord Is Still Used as Attack Vector โ A Six Month Analysis of Malicious Links Intercepted by Chat Protection
Bitdefender has released research on a six-month analysis of Discordโs use as an attack vector by cybercriminals. The research is based on 35 million scanned URLs in which 50,000 dangerous links were detected for distributing malware, phishing campaigns and spam, along with detection from untrusted sources.
Hackers often use Discord to push malware, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..