The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity
The article talks to the importance and urgency of Real-Time Cyber Asset Risk Reporting in today’s threat landscape. It highlights Australian statistics, touching on increases in attack frequency, targeted industries, and the financial impact on Australian businesses, and how Australian business may be lagging behind in their defences, and touches on ...

Scams and The Critical Role for Australian Banks
Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission's report Australians lost AUD $2.74 billion to scams in 2023 - although this was a welcome decline compared to 2022 (AU$3.15 billion lost) it is still alarmingly ...

Sustainability in Business is More than a Reusable Coffee Cup
When people hear sustainability, some might straight away think - oh yes a reusable coffee cup. Perhaps, however in this context we’re talking about sustainability within tech businesses and what does this mean and more importantly - what does that look like?Luke Hargreaves, Founder and CEO from Aquainnis chatted to me about the urgent need for ...

How To Quickly Kick Start Holistic SAP Security
SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.

Exclusive: Zero Trust Security – The way Forward for IT and Security
In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities
As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.

Deepfakes and the US Election | A Slippery Slope
The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub.
As a community service, the JFrog Security Research team continuously scans public ...
In The News
Trustwave Launches Two New Microsoft Security Accelerators to Increase Security Maturity and Drive Cost Savings
December 4, 2024 – Trustwave, a leading cybersecurity and managed security services provider, has announced the launch of two new Microsoft Security Accelerators designed to help organisations quickly improve their security maturity and identify cost-saving opportunities. These accelerators – the Accelerator for Microsoft Purview and the Accelerator ...
Lenovo Unveils Water-Cooled Supercomputers For Advanced Energy-Efficient Computing
Lenovo, the world’s #1 supercomputer provider, has unveiled new high-performance innovations that deliver game-changing energy efficiency and accelerated computing to help scientific and industry researchers propel AI-powered transformation at any scale. Showcased at Supercomputing 2024 (SC24), the new powerful, energy-efficient platforms will help ...
NIWA Selects VAST Data to Set New Standards in Environmental Research Infrastructure
AI data platform company, VAST Data, today announced that the National Institute of Water and Atmospheric Research (NIWA), New Zealand’s leading Crown Research Institute for environmental science, has selected the VAST Data Platform to update and future-proof its data infrastructure. The platform will enable NIWA to synchronise its production workloads ...
Elastic Announces General Availability of Elastic Cloud Serverless Powered by Search AI Lake
The new stateless Elasticsearch architecture is optimised for real-time search on limitless data to scale security, observability and search without operational overhead
Seven Must-know Technology Trends For 2025
Introduction
Technological innovation is reshaping business competition rules. Yesterday’s successful strategies may not be enough for tomorrow’s challenges and businesses must adapt to the next wave of advancements, from quantum computing to industry-specific artificial intelligence (AI) solutions. Logicalis Australia has identified seven key trends ...
Axis Communications Celebrates 40 Years of Innovation and Growth in Oceania
From a one-person operation to a 55-member team, supported by a thriving partner network
Over-the-Air Vulnerabilities Discovered in Advantech EKI Access Points
SYDNEY – 29 November 2024 – As industrial networks expand into wireless domains, new vulnerabilities are exposing critical infrastructure to potential cyber threats. With this evolution, safeguarding wireless devices within industrial settings has become essential. Since the launch of Guardian Air, Nozomi Networks has emphasised the need for stronger ...
Macquarie Government expands Netskope partnership following major government network security win
Macquarie Government today announced it has expanded its four-year partnership with global SASE (Secure Access Service Edge) leader, Netskope, following a large-scale Federal Government network security deployment.
The Australian sovereign company deployed Netskope’s market-leading single-vendor SASE platform to the Department, ensuring it maintains ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..