The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Russians buy fake employment & illness certificates on Telegram to avoid conscription
Since Putin’s mobilization order was announced, Flashpoint has observed a growing number of chatter and advertisements on Russian illicit communities and social media platforms, offering methods or access to avoid the draft.

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system
Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?
By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center
The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...

Why You Should Care About the Optus Breach If You’re A Customer
By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack.
What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)
The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...

Why SD-WAN Is Worth the Hype: Transform Your Network
Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...

MyCISO Launches in Style
Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them.
The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...
Security Fatigue: How Public Agencies Can Counter this Silent Menace
Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
No results found.
In The News
NetApp Makes Data More Resilient With Secure Storage
New capabilities for protecting data cement NetApp’s position as the most secure storage on the planet
F5 And NetApp Accelerate And Streamline Large Language Model AI Deployments
Collaboration bolsters generative AI capabilities with advanced data management and secure multicloud networking services for RAG integration
SYDNEY, AUSTRALIA – SEPTEMBER 25, 2024 – F5 (NASDAQ: FFIV) and NetApp (NASDAQ: NTAP) today announced an expanded collaboration to accelerate and streamline enterprise AI capabilities using secure multicloud ...
Despite Increasing Cybersecurity Attacks, People Still Believe Antiquated Username And Passwords Are Strong Enough
Results from a new study by Yubico show the need for education and taking a more holistic approach to cybersecurity at both work and home
Forescout Announces New SaaS Operational Technologies Solution
Forescout Technologies has announced its new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organisations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid.
Forescout for OT Security combines:
...
Cloudflare Helps Content Creators Regain Control Of Their Content from AI Bots
With new tools to automatically control how AI bots can access content, Cloudflare is the first to stand up for content creators at scale
Rapid7 Adds Extended Ecosystem Support Of Third-Party Detections To Managed Detection And Response
Rapid7 has announced the addition of third-party detections for defence in-depth with Managed Threat Complete (MTC), the company’s Managed Detection and Response (MDR) solution. Rapid7’s global service now includes coverage for CrowdStrike Falcon, SentinelOne Singularity Endpoint, and Microsoft Defender for Endpoint.
Vulnerable APIs And Bot Attacks Costing Australian Businesses Up To $2 Billion Annually
Sydney, Australia — 23 September, 2024 — Thales, the cybersecurity leader that protects critical applications, APIs, and data, anywhere at scale, releases the “Economic Impact of API and Bot Attacks” report. The analysis of more than 161,000 unique cybersecurity incidents estimates that API insecurity and automated abuse by bots is responsible for as ...
Check Point Software Is Recognised As A Leader In Email Security, Showcasing Its Innovative AI-Based Threat Intelligence Capabilities
Harmony Email & Collaboration is celebrated for its continuous stream of patents and innovative features, achieving an eightfold growth in just three years
Redwood City, CA – September 20, 2024 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading cyber security platform provider of AI-powered, cloud delivered solutions, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..