The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies

Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal. Iron Bastion  have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
Zooming Around

Zooming Around

How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?
WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations. In March 2018, the Australian Prudential Regulation ...
To Infinity & Beyond… With Artificial Intelligence

To Infinity & Beyond… With Artificial Intelligence

We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it's about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the cloud computing space. The way I see it is that machine learning algorithms and advanced ...
Critical Communications

Critical Communications

Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of ...
Start Your Engines

Start Your Engines

You had a neat idea. You’ve built on it, and now started to turn it into a commercial reality. It doesn’t matter if you’ve the best product or service in the universe, if it’s not developed, marketed, sold, and delivered in the best possible way you’re falling short of your potential, and will flounder. You can’t do it all on your own of course, so now ...
How to Run Effective Security Awareness Training for your Organisation

How to Run Effective Security Awareness Training for your Organisation

Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we are revealing the techniques we find useful in our training sessions which should help you get started with your first phishing awareness training session for your organisation. (more…)
No results found.

In The News

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

Sydney, Australia – April 2, 2025 – OpenText™, today introduced the availability of Project Titanium X, now ready with Cloud Editions 25.2 (CE 25.2), the culmination of two years of strategic engineering powering the next generation of Business Clouds, Business AI and Business Technology. Cloud Editions 25.2 brings together a comprehensive set of ...
Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Proactive Multi-Agent Experience Uplevels the SOC, Enables Security Leaders, Analysts, and Investigators to Increase Productivity and Impact
JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust in Newly Created Software 
Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable, the cloud exposure management company, has identified a privilege escalation vulnerability in Google Cloud Run called ImageRunner. The vulnerability could have allowed attackers to bypass permissions, gain unauthorised access to container images and potentially expose sensitive data. Cloud Run, Google’s serverless container platform, uses a ...
World Cloud Security Day – CyberArk’s Insights On Effective Cloud Identity Security

World Cloud Security Day – CyberArk’s Insights On Effective Cloud Identity Security

“World Cloud Security Day is a timely reminder of the critical need for robust cloud identity security. Cloud-native organisations operating in complex, multi-cloud environments are navigating a rapidly evolving landscape and an explosion of identities – both human and machine - that traditional security models struggle to manage. The lack of ...
Motorola Solutions Delivers Resilient Security for Critical Infrastructure with New Pelco Portfolio

Motorola Solutions Delivers Resilient Security for Critical Infrastructure with New Pelco Portfolio

Motorola Solutions has announced the new Pelco, an innovative portfolio of artificial-intelligence-powered devices that are purpose-built for enterprises operating in some of the most challenging environments, like oil and gas and ports. Backed by the company’s deep engineering expertise and significant investments in research and development, Pelco’s ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This