The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

OT:ICEFALL – New Vulnerabilities and Insights on OT Security Design and Patching

OT:ICEFALL – New Vulnerabilities and Insights on OT Security Design and Patching

In Forescout’s final OT:ICEFALL report, Forescout Vedere Labs presents three new vulnerabilities and concludes the project after one year of research following the original disclosure.
Recap: Risk to Resilience – ANZ

Recap: Risk to Resilience – ANZ

Trend Micro is currently running one of the largest cybersecurity roadshows ever, the ‘Risk to Resilience World Tour’ covering more than 120 locations around the globe. 
Virtual Patching

Virtual Patching

Scenario 1:MyBank Pty Ltd has 300+ critical legacy enterprise applications. Almost all of them were built by the then IT-savvy non-developers. They were built with limited or no design considerations. Security was not even a design-criteria back then. These applications continue to run either because they are now too complex, too critical, or the ...
Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Accenture State of Cyber Resilience 2023 report reveals key traits of “cyber transformers,” who make cybersecurity the cornerstone of their business transformation efforts
CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

91% of Australian respondents experienced at least one ransom attack
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.  Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.  This event was hosted ...
No results found.

In The News

Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

BROOMFIELD, Colo. & FOSTER CITY, Calif. – January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant has announced its Neuro® AI Multi-Agent Accelerator and Multi-Agent Service Suite. These new offerings accelerate the development and adoption of AI agents, helping empower businesses to transform their business processes using AI agents for adaptive operations, real-time decision-making, and personalised customer experiences - to support all ...
Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

The Gartner® Peer Insights™ Customers' Choice Distinction is based on feedback and ratings from end-user professionals who have experience with the product or service
SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data

SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data

Popular generative AI security analyst can now be used to speed cybersecurity investigations and simplify threat hunting across a growing list of native and third-party sources
CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment. Defender for Identity is a cloud-based ...
Dragos and Yokogawa Forge Global Partnership to Strengthen Cybersecurity for Industrial Systems Worldwide

Dragos and Yokogawa Forge Global Partnership to Strengthen Cybersecurity for Industrial Systems Worldwide

Dragos and Yokogawa Electric have partnered to enhance industrial cybersecurity. By integrating Dragos’s OT cybersecurity platform with Yokogawa’s CENTUM VP system, the collaboration will provide visibility, threat detection, and response capabilities for industrial systems, advancing cybersecurity resilience amid digital transformation in industrial ...
Cisco Unveils AI Defense to Secure the AI Transformation of Enterprises

Cisco Unveils AI Defense to Secure the AI Transformation of Enterprises

Cisco’s end-to-end solution protects both the development and use of AI applications so enterprises can advance their AI initiatives with confidence. AI Defense safeguards against the misuse of AI tools, data leakage, and increasingly sophisticated threats, which existing security solutions are not equipped to handle. ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This