The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
Ensuring Secure Content in the Era of Digital Transformation

Ensuring Secure Content in the Era of Digital Transformation

Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.   As creating and sharing documents from anywhere ...
Boosting Software Security With a Binary Approach

Boosting Software Security With a Binary Approach

Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters. The access token, discovered by the JFrog Security Research ...
The Goal Is To Alleviate The Administrative Burden In Healthcare

The Goal Is To Alleviate The Administrative Burden In Healthcare

Stephanie Trunzo, Senior Vice President and General Manager at Oracle Industry. Trunzo dives deep into the changes Oracle Industries is bringing to the healthcare sector with applied AI and an open healthcare platform and what this actually means. Trunzo led with Oracle Industries' approach, which integrates specific industry needs into general ...
A Pledge to Secure Healthcare

A Pledge to Secure Healthcare

Discover why hospitals and healthcare providers are prime targets for cyberattacks and how strategies like microsegmentation can ensure patient safety.
Building Bridges with Hyperscalers

Building Bridges with Hyperscalers

Investing in strategic relationships is what drives NetApp and their success in the cloud space. According to Pravjit Tiwana, Senior Vice President, General Manager of Cloud Storage at NetApp walked through their view to building bridges with the major cloud providers, often referred to as hyperscalers. "We are the only first party cloud storage ...
No results found.

In The News

Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia

Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia

Honeywell today announced its Integrated Controls and Safety System (ICSS) will be designed and implemented in Iluka Resources’ (Iluka) Eneabba rare earths refinery in Western Australia to help improve production efficiency and create a safer environment for its workers. Through a strategic partnership between the Australian Government and Iluka, the ...
Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider. This strategic implementation will modernise and integrate business ...
Tenable Research in Verizon DBIR: Additional Research Analysis

Tenable Research in Verizon DBIR: Additional Research Analysis

Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited ...
New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into the evolving threat landscape of ransomware attacks. With cyber threats becoming more sophisticated and frequent, the report underlines the need for organisations to prioritise ...
Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

“The Armis Vulnerability Intelligence Database is a critical, accessible resource built by the security community, for the security community. It translates vulnerability data into real-world impact so that businesses can adapt quickly and make more informed decisions to manage cyber threats.”
CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

Companies team to empower organisations to securely leverage AI agents
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

ConfusedComposer Exploits Hidden Cloud Service Dependencies
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This