The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.
What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...
Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
No results found.

In The News

ColorTokens Highlighted Among Top Providers of Microsegmentation Technology by Industry Experts, Paving the Way for Continued Success in 2025

ColorTokens Highlighted Among Top Providers of Microsegmentation Technology by Industry Experts, Paving the Way for Continued Success in 2025

ColorTokens Announces Key Achievements and Industry Accolades in 2025; Named “Visionary Vendor” by EMA, Recognized as Leader by GigaOm, and Awarded Four Globee Cybersecurity Awards.
Cisco Continues to Drive Innovation to Reimagine Security for the AI Era

Cisco Continues to Drive Innovation to Reimagine Security for the AI Era

New Cisco innovations address the complexities for security professionals to embrace the AI era in today’s dynamic threat landscape Cisco XDR and Splunk Security advancements simplify threat detection and response with cutting edge agentic AI Cisco and ServiceNow deepen partnership to ensure customers can efficiently adopt and scale AI ...
Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale

Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale

Cisco and ServiceNow deepen partnership to ensure customers can adopt and scale AI securely and efficiently.    Companies will bring portfolios closer together to help enterprises evolve their organizations as they embrace AI. First planned integration will tackle AI security and risk with Cisco AI Defense and ServiceNow’s Security Operations ...
Qualys Unveils Policy Audit with Enhanced Efficiency for Continuous Audit Readiness

Qualys Unveils Policy Audit with Enhanced Efficiency for Continuous Audit Readiness

Enhancements streamline evidence collection, prioritise risk-based remediation, and ensure continuous audit readiness, helping organisations reduce compliance costs and regulatory exposure
Rapid7 Launches Managed Detection & Response (MDR) for Enterprise, a Fully Managed and Customised Service

Rapid7 Launches Managed Detection & Response (MDR) for Enterprise, a Fully Managed and Customised Service

Rapid7 has launched Managed Detection & Response (MDR) for Enterprise, a fully managed and customisable detection and response service designed to meet the unique demands of complex, distributed enterprise environments.
Check Point Software Technologies and Illumio Accelerate Zero Trust Adoption with Proactive Threat Prevention and Unified Intelligence

Check Point Software Technologies and Illumio Accelerate Zero Trust Adoption with Proactive Threat Prevention and Unified Intelligence

Integration accelerates breach identification and containment, effectively stops lateral movement of threats across the enterprise
Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia

Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia

Honeywell today announced its Integrated Controls and Safety System (ICSS) will be designed and implemented in Iluka Resources’ (Iluka) Eneabba rare earths refinery in Western Australia to help improve production efficiency and create a safer environment for its workers. Through a strategic partnership between the Australian Government and Iluka, the ...
Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider. This strategic implementation will modernise and integrate business ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This