The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to establish a ‘security-aware’ business culture

How to establish a ‘security-aware’ business culture

When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck.
ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

New Research Highlights Uncertainty Around XDR Definition, Implementation and Resources Needed
More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

Alarmingly, more than 1 in 5 Aussies surveyed have fallen victim to an online dating/romance scam.
Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief

Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief

Bitdefender have today released their Threat Debrief, examining cyber attacks detected throughout December 2022. The report explores the most prevalent ransomware families, countries experiencing the most ransomware attacks, the most popular Android trojans being used by cyber criminals, and domains being targeted with spoof attacks (where attackers ...
The Collateral Damage of Carpet Bombing – Why All Is Often Nothing

The Collateral Damage of Carpet Bombing – Why All Is Often Nothing

History The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a concentration of high-value and (hopefully) well produced advertising. It was designed to not be ...
NEW FLASHPOINT REPORT SHOWS ROLE OF OPEN-SOURCE INTELLIGENCE IN RUSSIA’S FULL-SCALE INVASION OF UKRAINE

NEW FLASHPOINT REPORT SHOWS ROLE OF OPEN-SOURCE INTELLIGENCE IN RUSSIA’S FULL-SCALE INVASION OF UKRAINE

With the hybrid war approaching the one-year mark, Flashpoint’s comprehensive analysis details ten use cases on the impact of OSINT across cyber, physical, and informational battlefields
3 Data Priorities For Business Leaders This Year

3 Data Priorities For Business Leaders This Year

As we begin 2023, economic uncertainty looms large. Many organisations continue to invest in digital transformation but with rising inflation and global conditions impacting bottom lines, leaders in APAC will have to make intelligent investments in technology that will ensure operational efficiencies, boost resilience, and fortify long-term growth.
Low confidence and lack of understanding of privacy obligations revealed in new study

Low confidence and lack of understanding of privacy obligations revealed in new study

ISACA’s Privacy in Practice 2023 survey report shows only 35 percent of respondents in Australia and New Zealand are confident in their organisation’s ability to ensure data privacy and achieve compliance
No results found.

In The News

Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection

Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection

New integration combines Exabeam AI-powered analytics with Wiz's comprehensive cloud security insights to boost threat detection, investigation, and response capabilities 
Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub

Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub

Immediate access to the powerful, highly scalable AI/ML functions of ClearScape Analytics, in a serverless, on-demand compute engine that integrates natively with Fabric and OneLake
Tenable Comment on Annual Cyber Threat Report 2023-2024

Tenable Comment on Annual Cyber Threat Report 2023-2024

The ASD just released its Annual Cyber Threat Report and some of the incidents outlined were the result of exploiting public-facing applications and compromised accounts or credentials. Please find further comments below from Satnam Narang, sr. staff research engineer, Tenable. “The Annual Cyber Threat Report from the ASD’s ACSC provides insights into ...
Yubico Announces Yubico Enrollment Suite for Microsoft users, a Turnkey Passwordless Onboarding Experience

Yubico Announces Yubico Enrollment Suite for Microsoft users, a Turnkey Passwordless Onboarding Experience

November 20, 2024 – Today Yubico (NASDAQ: YUBICO), the leading provider of hardware authentication security keys, announced the availability of Yubico Enrollment Suite for Microsoft users, including Yubico FIDO Pre-reg and the new YubiEnroll. These solutions integrate with Microsoft’s Entra ID, helping organisations create stronger cyber resilience and ...
Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected

Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected

Organisations are reassessing their cybersecurity budget allocations after taking 5.9 months to recover from incidents in 2024 - over a month longer than expected
Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available

Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available

As the digital landscape grows increasingly interconnected, defenders face a critical challenge: the data and insights from various security tools are often siloed or, at best, loosely integrated. This fragmented approach makes it difficult to gain a holistic view of threats or assess their potential impact on critical assets. In a world where a single ...
Thales Expands CipherTrust Data Security Platform as-a-Service Offerings

Thales Expands CipherTrust Data Security Platform as-a-Service Offerings

CipherTrust Transparent Encryption helps organisations meet compliance mandates and protect data wherever it resides New Cloud Service includes Live Data Transformation for non-disruptive encryption and Ransomware Protection to monitor continuously for abnormal activity
Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This