The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)
The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network
Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style
Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning โShell Houseโ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them.
The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...
Security Fatigue: How Public Agencies Can Counter this Silent Menace
Every one of us knows one person or colleague who has a Post-itยฎย Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, Iโm willing to bet remote workers have passwords written down everywhere ...
What Iโve Learnt as an Entrepreneur
A few things Iโve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what Iโve learnt so far.
What Iโve Learnt as an Entrepreneur
A few things Iโve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what Iโve learnt so far.
Australian Public: How to add 2FA
Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. โHow?โ you ask. Well, letโs take a closer look at how it works and how to get it working fast. To keep your online identity as ...
Privacy Has a Business Model Problem
Business growth should not come at the expense of customer privacy. Unfortunately, thatโs not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether itโs Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
In The News
OVHcloud Continues Making AI Simple With New NVIDIA GPUs and Top-of-the-line AI Models
OVHcloud, a global player and the European Cloud leader, today takes the stage at Adopt AI, Franceโs new AI-focused event, to renew its commitment to democratise AI within organisations in line with its core values for an open, transparent and trusted Cloud. In a booming AI market, OVHcloudโs vision aims to offer businesses the optimal capacity for ...
Wavelink Expands SecOps Services to Partners Via SIEM-as-a-Service Offering
Wavelink, a leader in providing enterprise solutions to the channel, has announced the expansion of its services portfolio, starting with security operations (SecOps). The first service in the enhanced portfolio is the introduction of a security information and event management (SIEM)-as-a-Service offering, expanding the companyโs reach to both ...
ManageEngine Strengthens Its Identity-first Security Offerings With Passwordless, Phishing-resistant Authentication
ManageEngine combats ransomware attacks and identity theft with its latest launch of FIDO2 authentication in its on-premises identity security solution.
The company also strengthens and protects network endpoints against unauthorised system actions by launching endpoint MFA in its cloud-native identity platform
Porsche Motorsport Appoints NetApp as Exclusive Intelligent Data Infrastructure Partner
NetApp expands relationship with Porsche Motorsport to provide holistic data solutions that boost performance on the track
SailPoint Launches Risk Connectors As Part of Its Atlas Platform To Help Organisations Identify and Act On Risks
SailPoint has teamed up with leading cybersecurity vendors including CrowdStrike and Proofpoint to apply risk scores that augment identity and access decisions
VAST Data Selected as First Data Platform for Cisco Nexus HyperFabric, a Generative AI Solution Developed in Collaboration with NVIDIA
AI data platform VAST Data, today at Cisco Live 2024, announced it is collaborating with Cisco (NASDAQ: CSCO), the leader in enterprise networking and security, and NVIDIA on a solution to offer enterprises simple, โโhigh-performance AI infrastructure coupled with an Ethernet-based AI fabric to handle large volumes of data at exabyte scale.
Ping Identity Named Leader in Two 2024 KuppingerCole Reports for CIAM and Passwordless
DENVER, June 4, 2024 โ Ping Identity, a leading provider of seamless and secure digital experiences, has been named an overall leader in two 2024 KuppingerCole Leadership Compass reports, including Customer Identity and Access Management (CIAM) and Passwordless Authentication of Customers.
Read KuppingerCole's 2024 Leadership Compass on CIAM
โThe ...
JFrog & GitHub Partner to Integrate Best of Breed Platforms, Unifying Software Supply Chain Management & Security
Fuelled by joint customers and community demand, JFrog and GitHub develop a unified roadmap to enhance DevOps, DevSecOps, MLOps, and AI practices
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..