The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Air Gap Is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap Is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...
Business Cyber Risks and the Humble Home Network

Business Cyber Risks and the Humble Home Network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...
Personal Liability in Cyber – What Can We Expect?

Personal Liability in Cyber – What Can We Expect?

The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability.
Absolute Advances New Era of Resilient Zero Trust

Absolute Advances New Era of Resilient Zero Trust

New 451 Research Report Underscores Need for Resiliency in Zero Trust, Achieved via Integrated Endpoint Security, Secure Access, Network Visibility, and Management
New White Paper From ISACA Delves Into Risk Tolerance

New White Paper From ISACA Delves Into Risk Tolerance

The first step to addressing the myriad types of risk that need to be managed in an organisation is understanding risk appetite and tolerance. ISACA has released two new resources that offer guidance in both areas: the Using Risk Tolerance to Support Enterprise Strategy white paper and Risk Scenarios Toolkit.
Nozomi Networks-Sponsored SANS Survey Finds Security Defences Are Getting Stronger as Cyber Threats to OT Environments Remain High

Nozomi Networks-Sponsored SANS Survey Finds Security Defences Are Getting Stronger as Cyber Threats to OT Environments Remain High

Nozomi Networks Inc., the leader in operational technology (OT) and IoT security, today announced the SANS 2022 OT/ICS Cybersecurity Report finds industrial control systems (ICS) cybersecurity threats remain high as adversaries set their sights on control system components. In response, organisations have significantly matured their security postures ...
New Genetec Research Shows Cybersecurity Remains a Top Concern for Physical Security Professionals Worldwide

New Genetec Research Shows Cybersecurity Remains a Top Concern for Physical Security Professionals Worldwide

As cybersecurity awareness month becomes a focus of discussion in October, new research conducted by Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shows that cybersecurity remains a top concern for physical security professionals going into 2023.
We’re Still Terrible at Passwords, Confirms New Research

We’re Still Terrible at Passwords, Confirms New Research

Poor password management making it easy for cyber-attackers to access corporate systems
No results found.

In the News

Trend Micro Warns of Thousands of Exposed AI Servers

Trend Micro Warns of Thousands of Exposed AI Servers

Latest research reveals mounting infrastructure-level risks from diverse components
Nozomi Networks Labs Report Finds Australia the Fourth Most Targeted Country

Nozomi Networks Labs Report Finds Australia the Fourth Most Targeted Country

The latest Nozomi Networks Labs OT & IoT Security Report released today finds Australia the fourth most targeted country. The report assesses the operational technology (OT) and Internet of Things (IoT) threat landscape to provide insights into how industrial organisations and critical infrastructure are being targeted by cyberattacks. Leveraging a ...
Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform

Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform

Tenable One now connects more of the security stack than any other exposure management platform, empowering customers with unmatched context into their cyber exposure
FieldEx Leverages DataDog to Enhance Resilience and Operational Efficiency

FieldEx Leverages DataDog to Enhance Resilience and Operational Efficiency

Malaysian startup scaled operations and streamlined issue detection and alerting using Datadog’s comprehensive cloud observability platform
Rapid7 Launches Incident Command: AI-Native SIEM Empowers Analysts to Act With Speed and Precision From Risk to Response

Rapid7 Launches Incident Command: AI-Native SIEM Empowers Analysts to Act With Speed and Precision From Risk to Response

Rapid7 has launched Incident Command, a next-gen SIEM built on its Command Platform to transform how security teams detect, investigate, and respond to threats. Powered by SOC-tested Agentic AI, it unifies threat detection, exposure management, automation, and curated threat intelligence in a single interface.
Australian IT Teams Spend a Quarter of Their Week on Outages, yet Report Strong Resilience

Australian IT Teams Spend a Quarter of Their Week on Outages, yet Report Strong Resilience

New SolarWinds Report Reveals a Gap A Perception Gap, As Many Local IT Teams Struggle With Processes, Staffing, and Technology Readiness 
Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface

Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface

Active Patching, a fully automated patching and remediation solution integrated into Rapid7’s Exposure Command solution. Powered by Automox, it empowers security and IT teams to proactively mitigate risk across vulnerable assets.
Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

New report explores the tactics, techniques, and procedures attackers use and the fallout for organisations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This