The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Darktrace – Media Roundtable | Event Report

Darktrace – Media Roundtable | Event Report

I was recently invited to a Roundtable Media Event held by Darktrace to unpack the new era of cyber security threats. Held on Thursday 16th June, it was led by Tony Jarvis, Director of Enterprise Security and Dave Palmer, Chief Product Officer. The following is a synopsis of the event and a deeper dive into what was covered.   Most Significant ...
OCI User Access Review Made Easy

OCI User Access Review Made Easy

I’m sure we can all agree, adopting a cloud strategy is awesome. The opportunities and benefits it affords are many. However cloud governance is an ongoing problem that plagues security, compliance, and management teams, which cloud vendors like Oracle are continually trying to solve. If you’re reading this, you’ve probably been asked, or heard at ...

Media Alert: Scammers Hack Twitter Accounts to Steal Popular NFTs and Digital Currencies

According to recent research, published by Tenable’s Staff Research Engineer, Satnam Narang, scammers have once again dug deep into their bag of tricks to capitalise on the fervour in non-fungible tokens (NFT) and cryptocurrencies. Many are hijacking verified and unverified accounts on Twitter to impersonate popular NFT projects including Bored Ape ...
Why Renewal of Your Privacy Practice Is Critical

Why Renewal of Your Privacy Practice Is Critical

It is without doubt that the COVID-19 pandemic forced some of the most significant changes in society, business and workforce practices in the last century. With billions of consumers and workers driven online, businesses adapted and accelerated their digital strategies. As staff worked remotely and scammers capitalised on the explosion of e-commerce, ...
Communication for Internal Teams on the Importance of Understanding Risk

Communication for Internal Teams on the Importance of Understanding Risk

If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of understanding risk in the face of change. Through my work, I’ve lately had a huge volume ...
Communication for Internal Teams on the Importance of Understanding Risk

Communication for Internal Teams on the Importance of Understanding Risk

If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry, which I believe needs a lot more attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of understanding risk in the face of change. Through my work, I’ve lately had a huge volume ...
The Home of the Free*

The Home of the Free*

*Terms and Conditions apply. SITUATION Cambridge Analytica was involved in a firestorm recently following reports spearheaded by The New York Times that it'd obtained and used data on over 50 million Facebook consumers with the goal to promote the presidential campaign of Donald Trump. Part of its pitch to brands and candidates has been its expertise ...
ISACA ANZ | Cyber-safe Christmas

ISACA ANZ | Cyber-safe Christmas

Introduction: It’s that time of year, again; Christmas! This isn’t always a happy and joyous time for everyone, especially with what we've all been through to one degree or tuther in 2020. We wanted to ensure that retailers are improving their security posture to help better protect their customers from any further difficulties when looking to find the ...
No results found.

In the News

ManageEngine Enhances AD360 With Risk Exposure Management and Local User MFA Features to Strengthen Identity Threat Defences

ManageEngine Enhances AD360 With Risk Exposure Management and Local User MFA Features to Strengthen Identity Threat Defences

New Capabilities Help Enterprises Visualise Attack Paths, Enforce MFA on Unmanaged Local Accounts, and Align Identity Security With the Zero Trust Framework The identity risk exposure management feature adds identity threat detection capabilities that help uncover how attackers could escalate privileges or move laterally within the environment With ...
Tenable Comment on SharePoint Zero-day Vulnerability

Tenable Comment on SharePoint Zero-day Vulnerability

On July 19, reports emerged that Microsoft SharePoint Servers worldwide were under active exploitation. Researchers at Eye Security published a blog post detailing their identification of an “active, large-scale exploitation” that was initially linked to a pair of vulnerabilities in SharePoint dubbed ToolShell. Successful exploitation of CVE-2025-53770 ...
Protecting Customers From Octo Tempest Attacks Across Multiple Industries

Protecting Customers From Octo Tempest Attacks Across Multiple Industries

In recent weeks, Microsoft has observed Octo Tempest, also known as Scattered Spider, impacting the airlines sector, following previous activity impacting retail, food services, hospitality organizations, and insurance between April and July 2025. This aligns with Octo Tempest’s typical patterns of concentrating on one industry for several weeks or ...
JFrog Enables AI-Driven Developer Workflows With Robust MCP Server

JFrog Enables AI-Driven Developer Workflows With Robust MCP Server

JFrog’s Model Context Protocol (MCP) server allows developers to seamlessly employ AI-agents across the JFrog Platform, enabling faster, more reliable, secure software development & delivery at scale
Figma Deepens Local Roots in Australia With Local Data Hosting and More

Figma Deepens Local Roots in Australia With Local Data Hosting and More

Figma introduces new governance features for enterprise customers, with local data residency expected later this year.
ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship

ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship

The scholarship is part of ESET’s broader commitment to closing the gender gap in cybersecurity, an industry that remains disproportionately male, despite growing awareness of the need for diverse perspectives. With an estimated 5,000 additional cybersecurity professionals needed each year to meet national targets, programs like this play a vital role ...
Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities Through AI Innovation

Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities Through AI Innovation

Seasoned technologist and former Trigo CTO to lead Check Point’s global cyber security and AI strategy and AI centres
ROLLER Achieves 60% Cloud Savings and Improved Reliability With DataDog

ROLLER Achieves 60% Cloud Savings and Improved Reliability With DataDog

Sydney, Australia – July 22, 2025 – Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today announced ROLLER, an Australian-founded software company for attractions, has streamlined operations, improved availability, and reduced cloud infrastructure costs using the Datadog platform. ROLLER is the software ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This