The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Turning Camera Surveillance on its Axis
Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...
Unmasking Identity Risks Before They Become Breaches

Unmasking Identity Risks Before They Become Breaches

An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.
Cyber-securing Enterprises, the AI Way

Cyber-securing Enterprises, the AI Way

“...Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...
The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or firewalls, but in the mindsets shaping our national response. Surprisingly, a solution to our cybersecurity maturity might not be in quantum encryption or artificial intelligence but ...
AI Coding Assistants Boost Productivity … But At What Cost to Security?

AI Coding Assistants Boost Productivity … But At What Cost to Security?

As the pressure mounts to ship faster and innovate more aggressively, development teams must remember that code security is no longer optional but a business-critical necessity.
Baseline Compliance Is Just The Starting Line

Baseline Compliance Is Just The Starting Line

For years, compliance has been the word that quickly put anyone on the back foot. Compliance is one of those words that often carries a negative connotation, but it doesn’t have to. Some forward-thinking leaders are looking to rewrite the compliance script entirely. Jadee Hanson, Chief Information Security Officer at Vanta, has no patience for ...
How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...
No results found.

In The News

DigiCert Forecasts the Security Priorities Poised to Define 2026 

DigiCert Forecasts the Security Priorities Poised to Define 2026 

From AI to quantum, eight tech predictions that show what organisations must brace for next year
NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne recently announced that it has been recognised as a Leader in two IDC MarketScape reports: Worldwide Unified Endpoint Management Software for Small and Medium Businesses (doc # US53003425, December 2025) Worldwide Client Endpoint Management Software for Windows Device Management (doc # US53002925, December 2025) NinjaOne was also ...
Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Innovation Partnership Award highlights deep collaboration, real-time intelligence sharing, and advanced security deployment across one of Australia’s leading financial trading platforms
The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

New Infoblox Threat Intel research finds that over 90 per cent of visits to parked domains now redirect users to malicious content, reversing a decade old risk profile.
Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Study shows verified brand identities in email protect consumers from phishing while driving higher engagement and brand credibility during peak online shopping season and beyond
Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Collaboration integrates firewalling, segmentation, and policy enforcement directly into NVIDIA BlueField-accelerated infrastructure for higher performance, stronger isolation, and simpler operations
Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated cybercriminal collective, and Mustang Panda, which Sophos X-Ops tracks ...
Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across telecommunications, cloud, cybersecurity, and data centres. Clifton, who after nearly 15 years in senior leadership, including more than a decade leading Macquarie Telecom, has ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This