The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cloudflare Helps Secure the Worldโ€™s Most Popular Messaging Applications

Cloudflare Helps Secure the Worldโ€™s Most Popular Messaging Applications

Connectivity cloud co, Cloudflare (NYSE: NET) announced Plexi, a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. A longtime Cloudflare verification partner, WhatsApp will be the first to implement this new auditing process to strengthen usersโ€™ trust in the applicationโ€™s encryption method.
How Australian Organisations Can Combat Rising Business Logic Abuse

How Australian Organisations Can Combat Rising Business Logic Abuse

By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According toย Market Data Forecast, the size of the global API market is anticipated to grow 34.7% from 2024 to 2029.ย  ...
Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Anna Perez, business development manager, Wavelink and Connected Healthย  Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; itโ€™s about upholding patient trust and safeguarding ...
The Five Key Processes For Staying Secure With SAP

The Five Key Processes For Staying Secure With SAP

Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.
The Increasing Role Of LLMs And AI In Physical Security

The Increasing Role Of LLMs And AI In Physical Security

The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...
Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...
Taking a Zero Trust Approach to Managing IoT in Manufacturing

Taking a Zero Trust Approach to Managing IoT in Manufacturing

As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.
Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the countryโ€™s most vulnerable.

In The News

OpenText Cybersecurity Unveils 2024โ€™s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure

OpenText Cybersecurity Unveils 2024โ€™s Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure

As cyberattacks grow more insidious, organisations are ramping up cybersecurity investments to defend essential services Sydney, Australia โ€“ 31st October 2024 โ€“ OpenText (NASDAQ: OTEX), (TSX: OTEX), has revealed its highly anticipated โ€œNastiest Malware of 2024โ€ list, spotlighting the yearโ€™s most notorious cyber threats. Now in its seventh year, ...
Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellenceย 

Qualys Cloud Platform Completes IRAP Protected Assessment, Reinforcing Commitment To Cybersecurity Excellenceย 

Qualys, a leading provider of disruptive cloud-based IT, security and compliance solutions, today announced that its multi-tenant Qualys Cloud Platform was successfully assessed at the โ€˜PROTECTEDโ€™ level by the Infosec Registered Assessors Program (IRAP), an initiative by the Australian Signals Directorate (ASD). This achievement demonstrates that ...
Hunter Versus Spy: Sophos โ€œPacific Rimโ€ Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China

Hunter Versus Spy: Sophos โ€œPacific Rimโ€ Report Details its Defensive and Counter-Offensive Operation with Multiple Interlinked Adversaries Based in China

Sophos recently released โ€œPacific Rim,โ€ a report detailing its defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. The attackers used a series of campaigns with novel exploits and customised malware to embed tools to ...
Trend Micro Celebrates Cybersecurity Excellence With Foodstuffs South Island, Accor, Dole, And Others

Trend Micro Celebrates Cybersecurity Excellence With Foodstuffs South Island, Accor, Dole, And Others

New Zealand's leading grocery group, Foodstuffs South Island, has been recognised as a winner of the Customer Innovator Award for integrating security into its digital strategies SYDNEY, November 1, 2024 โ€“ Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the winners of its 2024 Customer Awards. The ...
Forescout Vedere Labs Unveils Riskiest Connected Medical Devices

Forescout Vedere Labs Unveils Riskiest Connected Medical Devices

Forescout today published the โ€œUnveiling the Persistent Risks of Connected Medical Devicesโ€ report. Building on โ€œThe Riskiest Connected Devices in 2024โ€ report from June, this research analyses more than 2 million devices across 45 healthcare delivery organisations (HDOs) during the last week of May 2024. The findings reveal a growing risk from ...
ExtraHopยฎ Report Reveals Data Breach Costs Exceed Industry Estimates

ExtraHopยฎ Report Reveals Data Breach Costs Exceed Industry Estimates

SEATTLE โ€“ October 29, 2024 โ€“ ExtraHopยฎ, a leader in cloud-native network detection and response (NDR), today released a new report analysing the short- and long-term financial impacts high-profile data breaches have on publicly traded companies. According to the findings, a data breach costs an organisation US$677 million on average, millions more ...
Fortinet Delivers AI-Enhanced Data Protection And Insider Risk Management

Fortinet Delivers AI-Enhanced Data Protection And Insider Risk Management

FortiDLPโ€™s unified approach to data protection enables enterprise organisations to anticipate and prevent accidental and malicious data loss across cloud deployments, applications, and managed and unmanaged devicesย 
Trustwave’s 2024 Retail Report Series Highlights Alarming e-Commerce Threats And Growing Fraud Against Retailers

Trustwave’s 2024 Retail Report Series Highlights Alarming e-Commerce Threats And Growing Fraud Against Retailers

October 30, 2024 โ€“ Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues.ย  In its annual research, Trustwave SpiderLabs highlights the unique factors at play in ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This