The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Countering Healthcare Cyber Threats
Healthcare cyberattacks are surging. Discover how Zero Trust Microsegmentation defends against ransomware and AI threats, securing patient data and systems.

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments
Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications.

Cybercrime Is Soaring: Is Your Business Ready To Respond?
Key questions every organisation should consider when assessing their cybersecurity readiness.

Are Aussie Networks Future-fit?
According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy. Some might say that’s an alarming statistic. So what's stopping Aussie companies from getting their networks Future Fit?
Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages
In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse.
While legitimate businesses rely on ads to reach new audiences, ...

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives
As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...

How NetApp’s Government Relations are Shaping Secure Tech
Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks.
Representing ...

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography
The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
In The News
Forescout Announces 2024 Threat Roundup Report
Forescout announced key findings from its “2024 Threat Roundup” report, providing analysis of the evolving threat landscape. The Forescout Vedere Labs research highlights key trends from 2024, including threat actors, vulnerabilities, exploits, top targets and attacker locations, while drawing comparisons to 2023 and offering insights and strategic ...
NinjaOne Announces Intent To Acquire SaaS Backup And Data Protection Leader Dropsuite
NinjaOne today announced a definitive agreement to acquire Dropsuite for a total transaction value of approximately $252 million (USD). The acquisition is expected to close in the first half of 2025, subject to approval by Dropsuite’s shareholders, court approval, Australia’s Foreign Investment Review Board (FIRB) approval, and other customary closing ...
Vonahi Security Expands Its CREST Accreditation In Australasia
AUSTRALIA, 28 January 2025 — Vonahi Security (Vonahi), a leader in automated network penetration testing, is proud to announce its recent accreditation by CREST in Australasia. This prestigious recognition underscores Vonahi’s unwavering commitment to delivering the highest standards of cybersecurity services in the region, cementing its position among ...
Trustwave Unveils 2025 Cybersecurity Threat Report for Energy and Utilities Sector, Highlights Surge In Ransomware Attacks
January 23, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the energy and utilities sector, which is increasingly targeted due to its critical role in supporting national and global infrastructures.
In its annual research, the Trustwave SpiderLabs team ...
Rimini Street Announces Rimini Protect Advanced Hypervisor Security for VMware, Nutanix and All Other Linux-Based Hypervisors, Powered by Vali Cyber, to Safeguard Against Ransomware and Other Vulnerabilities
Rimini Street has announced Rimini Protect Advanced Hypervisor Security, an exclusive solution powered by Vali Cyber's AI/ML security technology for VMware, Nutanix and all other Linux-based hypervisors.
Rimini Protect Advanced Hypervisor Security is embedded into the industry-leading Rimini Support for VMware solution that replaces VMware annual ...
New Research: 63 Percent of Privacy Professionals Find Their Jobs More Stressful Now Than Five Years Ago
SYDNEY, AUSTRALIA, 22 January 2025 - Privacy professionals are under growing pressure as they face budget cuts, resource challenges and changes in regulations. According to ISACA's State of Privacy 2025 survey report, almost half (48 percent) expect a budget decrease in the next year and 73 percent indicate expert-level privacy professionals are the ...
Blue Connections IT Achieves ISO/IEC 27001:2022 Certification, Reinforcing Its Commitment to Security-centric IT Practices
January 22, 2025 - Blue Connections IT, a gold and platinum partner for the world’s largest technology vendors, has announced that it has achieved ISO/IEC 27001:2022 certification, the globally recognised standard for information security management systems (ISMS). This certification highlights the company’s dedication to implementing robust security ...
F5 Equips Network and Security Teams With AI Assistant For F5 Distributed Cloud Services
‘Intelligent partner’ for SecOps and NetOps will allow teams to query network activity, drill down into security events and rapidly implement mitigations.
New support for teams who must manage more deployment models than ever, with 88% of organisations now employing a hybrid approach
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..