The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Russians buy fake employment & illness certificates on Telegram to avoid conscription

Russians buy fake employment & illness certificates on Telegram to avoid conscription

Since Putin’s mobilization order was announced, Flashpoint has observed a growing number of chatter and advertisements on Russian illicit communities and social media platforms, offering methods or access to avoid the draft.
IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.
What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...
Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
No results found.

In The News

NetApp Makes Data More Resilient With Secure Storage

NetApp Makes Data More Resilient With Secure Storage

New capabilities for protecting data cement NetApp’s position as the most secure storage on the planet
F5 And NetApp Accelerate And Streamline Large Language Model AI Deployments

F5 And NetApp Accelerate And Streamline Large Language Model AI Deployments

Collaboration bolsters generative AI capabilities with advanced data management and secure multicloud networking services for RAG integration SYDNEY, AUSTRALIA – SEPTEMBER 25, 2024 – F5 (NASDAQ: FFIV) and NetApp (NASDAQ: NTAP) today announced an expanded collaboration to accelerate and streamline enterprise AI capabilities using secure multicloud ...
Despite Increasing Cybersecurity Attacks, People Still Believe Antiquated Username And Passwords Are Strong Enough

Despite Increasing Cybersecurity Attacks, People Still Believe Antiquated Username And Passwords Are Strong Enough

Results from a new study by Yubico show the need for education and taking a more holistic approach to cybersecurity at both work and home
Forescout Announces New SaaS Operational Technologies Solution

Forescout Announces New SaaS Operational Technologies Solution

Forescout Technologies has announced its new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organisations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid. Forescout for OT Security combines: ...
Cloudflare Helps Content Creators Regain Control Of Their Content from AI Bots

Cloudflare Helps Content Creators Regain Control Of Their Content from AI Bots

With new tools to automatically control how AI bots can access content, Cloudflare is the first to stand up for content creators at scale
Rapid7 Adds Extended Ecosystem Support Of Third-Party Detections To Managed Detection And Response

Rapid7 Adds Extended Ecosystem Support Of Third-Party Detections To Managed Detection And Response

Rapid7 has announced the addition of third-party detections for defence in-depth with Managed Threat Complete (MTC), the company’s Managed Detection and Response (MDR) solution. Rapid7’s global service now includes coverage for CrowdStrike Falcon, SentinelOne Singularity Endpoint, and Microsoft Defender for Endpoint.
Vulnerable APIs And Bot Attacks Costing Australian Businesses Up To $2 Billion Annually

Vulnerable APIs And Bot Attacks Costing Australian Businesses Up To $2 Billion Annually

Sydney, Australia — 23 September, 2024 — Thales, the cybersecurity leader that protects critical applications, APIs, and data, anywhere at scale, releases the “Economic Impact of API and Bot Attacks” report. The analysis of more than 161,000 unique cybersecurity incidents estimates that API insecurity and automated abuse by bots is responsible for as ...
Check Point Software Is Recognised As A Leader In Email Security, Showcasing Its Innovative AI-Based Threat Intelligence Capabilities

Check Point Software Is Recognised As A Leader In Email Security, Showcasing Its Innovative AI-Based Threat Intelligence Capabilities

Harmony Email & Collaboration is celebrated for its continuous stream of patents and innovative features, achieving an eightfold growth in just three years   Redwood City, CA – September 20, 2024  – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading cyber security platform provider of AI-powered, cloud delivered solutions, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This