The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
Australian Public: How to add 2FA

Australian Public: How to add 2FA

Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...
Privacy Has a Business Model Problem

Privacy Has a Business Model Problem

Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
Virus & Malware Scanning Object Storage in OCI

Virus & Malware Scanning Object Storage in OCI

If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem. I just clicked on this link, and my computer is doing something weird. I think my PC has a virus, what do I do? When it’s just a single computer, the answer is simple, ...
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...
No results found.

In The News

Bitdefender Partners With Cysurance To Provide MDR Customers With A Cybersecurity Breach Warranty Program

Bitdefender Partners With Cysurance To Provide MDR Customers With A Cybersecurity Breach Warranty Program

Bitdefender today announced a new cybersecurity breach warranty program for businesses that adopt its managed detection and response (MDR) services. The program, which offers up to US$1 million in financial compensation in the wake of security incidents impacting operations, is delivered through a partnership with Cysurance.   “As the threat ...
Elastic Announces AI Ecosystem to Accelerate GenAI Application Development

Elastic Announces AI Ecosystem to Accelerate GenAI Application Development

Elasticsearch vector database integrations with industry-leading AI technology give developers best-in-class resources to expedite the deployment of RAG applications
Check Point Unveils New AI-Powered Network Security Innovations to Raise the Bar on Threat Prevention

Check Point Unveils New AI-Powered Network Security Innovations to Raise the Bar on Threat Prevention

New Check Point Quantum Firewall Software R82 delivers new AI engines, post-quantum encryption, accelerated DevOps, with greater simplicity for data centre operations
Trend Micro Platform Enables Partners to Double Impact and Revenue

Trend Micro Platform Enables Partners to Double Impact and Revenue

Attack surface management capabilities drive adoption by small and medium businesses (SMBs) through Managed Service Providers (MSPs).
Axis Introduces Next-Generation Imaging, AI-Powered Analytics, and Cybersecurity with ARTPEC-9 SoC

Axis Introduces Next-Generation Imaging, AI-Powered Analytics, and Cybersecurity with ARTPEC-9 SoC

Axis Communications, the leading network camera manufacturer, has announced the launch of ARTPEC-9, its next-generation System on Chip (SoC), giving security managers new capabilities in AI-powered analytics, image quality and cybersecurity while reducing storage costs.
Rapid7 Expands Exposure Command With Support For AWS Resource Control Policies

Rapid7 Expands Exposure Command With Support For AWS Resource Control Policies

Rapid7's Exposure Command solution now supports Amazon Web Services (AWS) Resource Control Policies (RCPs). As a launch partner for this powerful feature, Rapid7 now provides additional visibility, insights, and best practices that guide customers in addressing complex enterprise Identity and Access Management (IAM) challenges across the modern attack ...
Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection

Exabeam and Wiz Partner to Strengthen Cloud Security Threat Detection

New integration combines Exabeam AI-powered analytics with Wiz's comprehensive cloud security insights to boost threat detection, investigation, and response capabilities 
Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub

Teradata AI Unlimited in Microsoft Fabric is Now Available for Public Preview through Microsoft Fabric Workload Hub

Immediate access to the powerful, highly scalable AI/ML functions of ClearScape Analytics, in a serverless, on-demand compute engine that integrates natively with Fabric and OneLake
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This