The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
Australian Public: How to add 2FA

Australian Public: How to add 2FA

Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...
Privacy Has a Business Model Problem

Privacy Has a Business Model Problem

Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
Virus & Malware Scanning Object Storage in OCI

Virus & Malware Scanning Object Storage in OCI

If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem. I just clicked on this link, and my computer is doing something weird. I think my PC has a virus, what do I do? When it’s just a single computer, the answer is simple, ...
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...
Darktrace – Media Roundtable | Event Report

Darktrace – Media Roundtable | Event Report

I was recently invited to a Roundtable Media Event held by Darktrace to unpack the new era of cyber security threats. Held on Thursday 16th June, it was led by Tony Jarvis, Director of Enterprise Security and Dave Palmer, Chief Product Officer. The following is a synopsis of the event and a deeper dive into what was covered.   Most Significant ...

In The News

LogRhythm’s Machine Data Intelligence Fabric Empowers AI-Ready Organisations to Enter the Modern Era with Confidence

LogRhythm’s Machine Data Intelligence Fabric Empowers AI-Ready Organisations to Enter the Modern Era with Confidence

BROOMFIELD, Colo.—July 1, 2024—LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its ninth consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to enhance the output of ...
Motorola Solutions Acquires Noggin, a Global Provider of Critical Event Management Software

Motorola Solutions Acquires Noggin, a Global Provider of Critical Event Management Software

Motorola Solutions has acquired Noggin, a global provider of cloud-based business continuity planning, operational resilience and critical event management (CEM) software. The company is headquartered in Sydney, Australia, with a global footprint of customers. Noggin’s software helps enterprises and critical infrastructure anticipate, prepare for ...
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface

Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface

Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface Rapid7 extends its security operations platform to unlock more accessible and accurate asset inventory for better security outcomes
ManageEngine Study Reveals Insufficient Visibility Into Business Processes and Infrastructure Automation in Australian SMEs

ManageEngine Study Reveals Insufficient Visibility Into Business Processes and Infrastructure Automation in Australian SMEs

ManageEngine, today unveiled the findings of its comprehensive Digital Intensity in Australia Study, conducted by technology advisory firm, Ecosystm. As market competition increases, small to midsize enterprises (SMEs) in Australia are shifting to modern technology infrastructure to maintain their competitive edge. However, this surge in digital ...
Elastic Introduces Playground to Accelerate RAG Development with Elasticsearch

Elastic Introduces Playground to Accelerate RAG Development with Elasticsearch

A new interface enables developers to iterate and build RAG applications for A/B testing LLMs, tuning prompts and chunking data
AUSCERT Launches New Maturity Assessment Service To Help Organisations Improve Cybersecurity Posture

AUSCERT Launches New Maturity Assessment Service To Help Organisations Improve Cybersecurity Posture

AUSCERT General Manager, Dr Ivano Bongiovanni, says the new Maturity Assessment Service will enable organisations of all sizes to take proactive steps to enhance their cybersecurity posture and mitigate cybersecurity risks. 
Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16%

Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16%

Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16% Additional findings of high expected AI adoption growth suggests data utilisation is key to increasing visibility
Camelot Secure CEO Stanford Oliver Wins 2024 Fortress Cybersecurity Leadership Award

Camelot Secure CEO Stanford Oliver Wins 2024 Fortress Cybersecurity Leadership Award

Camelot Secure CEO Stan Oliver was named a winner in the Leadership category by the prestigious 2024 Fortress Cybersecurity Awards. Stan’s submission rose to the top of the judges’ evaluations in part as a result of his pioneering leadership, innovative cybersecurity solutions, dedication to educational advancements, and ability to quickly overcome ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This