The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...
Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
No results found.

In The News

Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams

Threat Spotlight: Evolving ‘We Know Where You Live’ Tactics Personalize Sextortion Scams

Barracuda threat researchers have identified evolving tactics being used by cybercriminals in targeted sextortion scams. Criminals are now frequently using victims’ addresses and photos of their homes to better personalize sextortion phishing attacks and increase the pressure to pay. Extortion demands are also increasing from hundreds to thousands of ...
Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage

Cloudian Announces Support for NVIDIA GPUDirect Acceleration for Object Storage

Cloudian today announced its integration with NVIDIA Magnum IO™ GPUDirectÒ Storage technology, delivering breakthrough performance of over 200GB/s from a HyperStore system. Cloudian HyperStore® with GPUDirect access simplifies the management of AI training and inference datasets – at petabyte and exabyte scales – while reducing costs by eliminating the ...
KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security

KPMG in India Announces Alliance with SecurityBridge GmbH to Strengthen SAP Security

KPMG in India will make use of SecurityBridge’s SAP security platform to elevate its offerings. Together with SecurityBridge, it will look to offer services that are holistic in its approach all-encompassing, which would include threat monitoring real time and enhancing compliance capabilities.
Logicalis Australia Strengthens Shoalhaven City Council Disaster Recovery And Data Security With Azure

Logicalis Australia Strengthens Shoalhaven City Council Disaster Recovery And Data Security With Azure

Melbourne,  Australia – 19 November 2024: Logicalis Australia, a leading global technology services provider, has assisted Shoalhaven City Council in reviewing their disaster recovery procedures and protecting applications and corporate data by migrating servers to Microsoft Azure. Shoalhaven City Council is a large regional council overseeing 50 ...
Rapid7’s Managed Extended Detection and Response (MXDR) Adds Coverage for Microsoft Security Telemetry

Rapid7’s Managed Extended Detection and Response (MXDR) Adds Coverage for Microsoft Security Telemetry

Rapid7’s latest expansion of its Managed Extended Detection and Response (MXDR) adds coverage for Microsoft security telemetry, which helps customers maximise their security investments and gain comprehensive threat detection and response to take command of their attack surface.
Infoblox Threat Intel identifies new malicious DNS threat actors linked to domain hijacking

Infoblox Threat Intel identifies new malicious DNS threat actors linked to domain hijacking

Hijacking domains using a ‘Sitting Ducks attack’ remain an under-recognised topic in the cybersecurity community. Few threat researchers are familiar with this attack vector and knowledge is scarce. However, the prevalence of these attacks and the risk to organisations are significant. Following its initial publication on Sitting Ducks, Infoblox ...
Diligent Launches AI-Powered Due Diligence Reports For Enhanced Supplier And Third-Party Risk Management

Diligent Launches AI-Powered Due Diligence Reports For Enhanced Supplier And Third-Party Risk Management

Diligent AI-powered reports build on history of industry experience to solve major compliance pain points
F5 Introduces AI Gateway To Manage And Secure Surging AI Traffic And Application Demands

F5 Introduces AI Gateway To Manage And Secure Surging AI Traffic And Application Demands

Manages security for both users and providers of AI services, overseeing authentication and zero trust capabilities Prioritises the consumption of AI services across teams, applications, and APIs Enables integrated automation with AI services and models from OpenAI, cloud providers, open source, and more
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This