The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

The race to zero hours: Why latest guidelines spell danger for Australia’s Cybersecurity

Cybercrime is the biggest threat facing corporate Australia today, costing the economy more than an estimated $3trillion.
Russians buy fake employment & illness certificates on Telegram to avoid conscription

Russians buy fake employment & illness certificates on Telegram to avoid conscription

Since Putin’s mobilization order was announced, Flashpoint has observed a growing number of chatter and advertisements on Russian illicit communities and social media platforms, offering methods or access to avoid the draft.
IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.
What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...
Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...
No results found.

In The News

Google Cloud Expands Risk Protection Program to Australia Amid Rising Cyber Threats and Insurance Pressures

Google Cloud Expands Risk Protection Program to Australia Amid Rising Cyber Threats and Insurance Pressures

Google Cloud today announced the expansion of its Risk Protection Program (RPP) to the Australian market, providing local organisations with a streamlined path to cyber insurance that reflects their real-time security posture. The move comes as Australian companies face rising cyber risks, stricter regulatory standards, and mounting insurance ...
SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel

SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel

SAP systems are integral to many organizations, managing critical business processes and sensitive data. However, protecting these systems against cyber threats has traditionally been challenging due to their complexity and the specialized nature of SAP applications.
Elastic Brings Enterprise Data to NVIDIA AI Factories

Elastic Brings Enterprise Data to NVIDIA AI Factories

Elasticsearch integrates with NVIDIA Enterprise AI Factory validated design to fuel AI agents and generative AI applications with real-time intelligence
SecurityBridge to Showcase AI-Powered CVA and Microsoft Sentinel Integration at SAP Sapphire 2025

SecurityBridge to Showcase AI-Powered CVA and Microsoft Sentinel Integration at SAP Sapphire 2025

SecurityBridge will be exhibiting at booth #414, demonstrating the latest innovations in SAP cybersecurity, including its newly released AI-powered Code Vulnerability Analyzer (CVA) and enhanced integration with Microsoft Sentinel.
Elastic Announces General Availability of Elastic Cloud Serverless on Google Cloud Marketplace

Elastic Announces General Availability of Elastic Cloud Serverless on Google Cloud Marketplace

Developers building observability, security, and search applications benefit from uncompromised speed and scale
NVIDIA Enterprise AI Factory Integrates CrowdStrike’s Falcon Platform Into Validated Design Architecture

NVIDIA Enterprise AI Factory Integrates CrowdStrike’s Falcon Platform Into Validated Design Architecture

CrowdStrike delivers end-to-end protection for enterprise AI factories built with NVIDIA Enterprise AI Factory validated design architecture
Tenable Powers AI-Driven Exposure Management with Third-Party Data Connectors and Unified Dashboards

Tenable Powers AI-Driven Exposure Management with Third-Party Data Connectors and Unified Dashboards

Tenable One bridges siloed security tools for faster, smarter, business-aligned security decisions
Cisco Study Reveals Alarming Deficiencies In Security Readiness

Cisco Study Reveals Alarming Deficiencies In Security Readiness

Cybersecurity readiness remains alarmingly low as only 3 percent of organisations in Australia have achieved a mature level of readiness. Organisations continue to struggle with the complexities introduced by AI, with 82% having experienced AI-related security incidents in the last year. The ongoing shortage of skilled cybersecurity professionals ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This