The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
Australian Public: How to add 2FA

Australian Public: How to add 2FA

Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...
Privacy Has a Business Model Problem

Privacy Has a Business Model Problem

Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
Virus & Malware Scanning Object Storage in OCI

Virus & Malware Scanning Object Storage in OCI

If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem. I just clicked on this link, and my computer is doing something weird. I think my PC has a virus, what do I do? When it’s just a single computer, the answer is simple, ...
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...
No results found.

In The News

Kyndryl Survey, Conducted With AWS, Reveals Cybersecurity Readiness Gap In Australian And New Zealand Enterprises

Kyndryl Survey, Conducted With AWS, Reveals Cybersecurity Readiness Gap In Australian And New Zealand Enterprises

Survey of enterprises in Australia and New Zealand confirms disconnect between cyber preparedness and readiness Urgent need for improved awareness and cyber resilience strategies amid rising threats
Fortinet Continues to Expand Generative AI Across Its Portfolio With Two New Additions To Simplify Security Operations

Fortinet Continues to Expand Generative AI Across Its Portfolio With Two New Additions To Simplify Security Operations

FortiAI now spans seven unique Fortinet products with new generative AI integrations for FortiNDR Cloud to accelerate threat coverage analysis and Lacework FortiCNAPP to streamline investigation 
Quadrant’s Security Operations Center Experts Receive 2024 SOC Analyst Appreciation Awards

Quadrant’s Security Operations Center Experts Receive 2024 SOC Analyst Appreciation Awards

Quadrant congratulates Charles Goggins, Joshua Hall, and Joshua Hubner for their exceptional achievements and dedication to advancing cybersecurity within the SOC. Their recognition highlights Quadrant's commitment to fostering talent and enhancing cybersecurity resilience.
WatchGuard Earns Top Awards from TrustRadius for Network and Endpoint Security, and Multi-Factor Authentication

WatchGuard Earns Top Awards from TrustRadius for Network and Endpoint Security, and Multi-Factor Authentication

TrustRadius accolades across product categories add to broad recognition for WatchGuard’s comprehensive cybersecurity platform
Elastic Enables Innovation in Next Generation Knowledge Management with LG CNS

Elastic Enables Innovation in Next Generation Knowledge Management with LG CNS

Elasticsearch enhances LG CNS’s KeyLook AI with hybrid search, achieving a 95% increase in search relevance to dramatically improve the accessibility and usability of corporate knowledge
2020Partners Kicks Off Dialogue In Australia

2020Partners Kicks Off Dialogue In Australia

Sydney, Australia – 2020Partners kicks off its inaugural Advanced Technology Dialogue in Sydney and Canberra, with support from the Australian Strategic Policy Institute (ASPI) and our media partner, KBI.Media. This initiative aims to facilitate greater connections between Australia, United Kingdom and the United States on mission critical technology ...
CrowdStrike to Acquire Adaptive Shield to Deliver the Only Platform that Unifies Cloud and Identity Security with Integrated SaaS Protection

CrowdStrike to Acquire Adaptive Shield to Deliver the Only Platform that Unifies Cloud and Identity Security with Integrated SaaS Protection

Falcon platform will deliver complete protection against identity-based attacks across hybrid cloud environments, from on-prem AD to cloud-based identity providers and SaaS apps
Proofpoint Signs Definitive Agreement to Acquire Normalyze

Proofpoint Signs Definitive Agreement to Acquire Normalyze

Acquisition of leading DSPM company will bolster Proofpoint’s human-centric security platform aiming to address the full spectrum of data security challenges across today’s complex data landscape
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This