The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
No results found.

In The News

Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface

Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface

Active Patching, a fully automated patching and remediation solution integrated into Rapid7’s Exposure Command solution. Powered by Automox, it empowers security and IT teams to proactively mitigate risk across vulnerable assets.
Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

New report explores the tactics, techniques, and procedures attackers use and the fallout for organisations
Research Identifies Emerging Risks When Businesses Deploy Multiple AI Agents – and How to Start Addressing Them

Research Identifies Emerging Risks When Businesses Deploy Multiple AI Agents – and How to Start Addressing Them

New report by Gradient Institute equips Australian organisations with tools to better understand risks as AI agents join the digital workforce
Spintel Launches New NBN 500/50Mbps Plan

Spintel Launches New NBN 500/50Mbps Plan

Exceptional Speed Without the Premium Price Tag
NinjaOne Appoints Geoff Davies as VP and Country Manager for ANZ

NinjaOne Appoints Geoff Davies as VP and Country Manager for ANZ

NinjaOne today announced the appointment of Geoff Davies as Vice President and Country Manager for Australia and New Zealand (ANZ). Davies brings more than 15 years of experience leading high-performance sales teams across the region. As VP and Country Manager, Davies will be responsible for growing NinjaOne’s business across Australia and New Zealand ...
Trend Micro and Google Cloud Deepen Collaboration to Advance AI-Driven Cybersecurity and Sovereign Cloud Solutions

Trend Micro and Google Cloud Deepen Collaboration to Advance AI-Driven Cybersecurity and Sovereign Cloud Solutions

Advancing proactive security across cloud environments and fighting online scams with AI
Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

IT teams and support desks replacing non-compliant remote access tools are turning to BeyondTrust to help them meet modern security and compliance standards. BeyondTrust Remote Support is compliance-ready, with built-in capabilities to help IT teams align with FIPS, CJIS, FedRamp, and other key security and compliance mandates without added complexity ...
Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable®, the exposure management company, today announced the next evolution of its industry-leading Tenable Vulnerability Priority Rating (VPR) to sharpen precision and focus on risks that pose the greatest threat. Powered by generative AI, enriched threat intelligence and context-aware scoring, Tenable VPR enables organisations to quickly understand ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This