The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime
Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.

Rome was not Built in a Day. Security is not Built in a Day
Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...

Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture
A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation
There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?
Introduction
In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...

Breaking Down Barriers to Cybersecurity Frameworks
Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s Essential Eight, effectively.
The complexity of deployment, the need for a cultural ...

Security is Not a Zero-Sum Game
The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong and when they do - our whole world turns with it.
Jeetu Patel, Executive Vice President & Chief Product Officer at Cisco, discussed his strong stance against monopolies in the tech industry and his view on collaboration and ...
In The News
New 2025 Genetec State of Physical Industry Report Shows Australia And New Zealand Accelerating Hybrid Cloud Adoption And IT’s Growing Strategic Influence
Report highlights a purpose-driven approach to cloud and AI adoption.
SYDNEY/AUCKLAND, December 5, 2024 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today shared the results of its 2025 State of the Physical Security Report. Based on insights from over 5,600 physical security leaders worldwide, including more ...
Tenable Adds Patch Management To Rapidly Close Security Exposures – Autonomous Patching Streamlines Discovery To Remediation, With Customisable Controls That Prevent Problematic Updates
Tenable®, the exposure management company, today announced the release of Tenable Patch Management, an autonomous patch solution built to quickly and effectively close vulnerability exposures in a unified solution. A strategic partnership and integration with Adaptiva, a global leader in autonomous endpoint management, provides the foundation of the ...
Cordant Partners with Cloud Security Leader Wiz to Enhance Pragmatic Cybersecurity Solutions in Australian Market
Melbourne, Australia 26th November 2024 - Cordant, Australia's leading pragmatic cybersecurity consultancy, today announced a partnership with Wiz, the rapidly-growing cloud security platform that has revolutionised how organisations protect their cloud infrastructure. This collaboration marks a significant milestone in bringing straightforward, ...
Fortinet Elevates Web Application Security and Performance with New Unified Platform
FortiAppSec Cloud consolidates key web application capabilities into a single offering, providing cutting-edge protection, seamless delivery, and centralised management across multi-cloud environments
Rapid7’s Managed Extended Detection and Response (MXDR) Adds Coverage for Amazon Web Services (AWS) Environments
Rapid7 has expanded its Managed Extended Detection and Response (MXDR) service to include enhanced support for AWS environments. This brings customers deeper cloud detection and response capabilities by combining cloud native telemetry, AWS security telemetry, and enhanced detections in the Rapid7 Command Platform.
Thales Unveils Data Risk Intelligence to Redefine Data Risk Visibility and Proactive Risk Mitigation
Data Risk Intelligence combines posture and behaviour-based data risk indicators to proactively identify and mitigate risks to sensitive data. First solution uniting the data security capabilities from the Imperva Data Security Fabric and Thales CipherTrust Data Security Platforms to provide highly confident data risk prioritisation with clear ...
More Than 60% Of Australian Employees Admit To Bypassing Cybersecurity Policies To Make Their Lives Easier
Privileged access issues combined with worrisome worker actions compound security risks for organisations
CyberArk Lab research also finds online history can be threat to employers as well as to personal lives
Teradata Introduces ‘Rapid-Start’ Generative AI Use Cases with Amazon Bedrock Integration
Teradata VantageCloud customers on AWS can immediately start implementing Gen AI use cases to fast-track business value and accelerate ROI
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..