The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Security Emerges as a Critical Input to User Experience Decisions

Security Emerges as a Critical Input to User Experience Decisions

Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey.
IBM Report: Ransomware Persisted Despite Improved Detection in 2022

IBM Report: Ransomware Persisted Despite Improved Detection in 2022

Manufacturing Most Extorted Industry; Email Thread Hijacking Attempts Spike; Time to Ransom Moves from Months to Days.
Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security

Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security

84% of codebases contained at least one known open source vulnerability, an almost 4% increase from last year’s findings.
Haste Is Waste! Is Google’s Fear of Missing out Hurting the Holistic Development of Artificial Intelligence (AI)

Haste Is Waste! Is Google’s Fear of Missing out Hurting the Holistic Development of Artificial Intelligence (AI)

23 Feb 2023 6:00 AM   Dr Samar Fatima, Research Fellow, Enterprise AI and Data Analytics Hub  Topics: Google, Bard, AI, artificial intelligence, ChatGPT  “The race for search engine supremacy is getting fierce amongst tech giants with the release of Open AI’s ChatGPT instilling competitive fear in those bigger companies such as ...
How Businesses Are Faring With the Rise of Cyber Threats: 15 Years in Review

How Businesses Are Faring With the Rise of Cyber Threats: 15 Years in Review

The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by ...
Report: 2022 a Breakthrough Year in the Development of Malware Targeting Critical Infrastructure

Report: 2022 a Breakthrough Year in the Development of Malware Targeting Critical Infrastructure

Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape
The Majority of Business Cyber Security Decisions Are Made Without Insight Into the Attacker, According to New Mandiant Report

The Majority of Business Cyber Security Decisions Are Made Without Insight Into the Attacker, According to New Mandiant Report

Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats
No results found.

In the News

Trend Micro Reinvents Proactive Security With Digital Twin Technology

Trend Micro Reinvents Proactive Security With Digital Twin Technology

Innovation at the speed of agentic AI, built on NVIDIA AI, provides a data-driven foundation for supercharged decision-making
Nozomi Networks Names David Hope as Regional Vice President for APJ

Nozomi Networks Names David Hope as Regional Vice President for APJ

Industry veteran to lead APJ as Nozomi Networks expands regional investment to support growing demand in APJ.
SecurityBridge Acquires CyberSafe to Deliver Contextual SSO, MFA and Passwordless Authentication to SAP Users

SecurityBridge Acquires CyberSafe to Deliver Contextual SSO, MFA and Passwordless Authentication to SAP Users

The acquisition marks a significant milestone in SAP security innovation, as CyberSafe’s flagship TrustBroker® products will further enrich the SecurityBridge platform capabilities. A two-way integration enables customers to transition from password-based authentication to multi-factor authentication across the SAP technology stack, with full insight ...
Boomi Brings Sovereign Data Integration to Australia

Boomi Brings Sovereign Data Integration to Australia

New Sydney-based deployment delivers fast, secure, and compliant data movement for enterprises managing AI, analytics, and regulatory risk
Bitdefender Launches Comprehensive Cybersecurity Advisory Services for Businesses

Bitdefender Launches Comprehensive Cybersecurity Advisory Services for Businesses

New Offerings Including Cybersecurity Advisory Retainer, Risk/Compliance Assessments and Expert-Led Strategic Guidance Enhance Cybersecurity Posture for Organisations
Sophos Launches New Partner Program to Drive Enhanced Growth, Profitability and Market Advantage for Partners

Sophos Launches New Partner Program to Drive Enhanced Growth, Profitability and Market Advantage for Partners

Sophos has launched a new Sophos Partner Program, unlocking multiple opportunities for partners to accelerate growth, deliver industry-leading cybersecurity solutions and stand out in an increasingly competitive market. The new program brings together Sophos’ and Secureworks’ global partners into one integrated, high-performance ecosystem and builds ...
DataDog Bolsters A/NZ Presence With Roz Gregory Appointment

DataDog Bolsters A/NZ Presence With Roz Gregory Appointment

Gregory to steer multi-year growth plans following strong local expansion and opening of Datadog’s first Australian data centre presence
Elastic Delivers New ES|QL Features for Cross-Cluster Scale, Data Enrichment, and Performance

Elastic Delivers New ES|QL Features for Cross-Cluster Scale, Data Enrichment, and Performance

New capabilities enhance ES|QL with production-ready lookup joins, cross-cluster query execution, observability, and over 30 performance optimisations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This