The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Anna Perez, business development manager, Wavelink and Connected Health  Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; it’s about upholding patient trust and safeguarding ...
The Five Key Processes For Staying Secure With SAP

The Five Key Processes For Staying Secure With SAP

Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.
The Increasing Role Of LLMs And AI In Physical Security

The Increasing Role Of LLMs And AI In Physical Security

The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...
Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...
Taking a Zero Trust Approach to Managing IoT in Manufacturing

Taking a Zero Trust Approach to Managing IoT in Manufacturing

As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.
Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the country’s most vulnerable.
What you missed at TechLeaders 2024

What you missed at TechLeaders 2024

I recently headed down to TechLeaders, which was hosted at Kirkton Park in the Hunter Valley. TechLeaders Australia is dedicated to the Australian technology industry. It serves as a platform for professionals, businesses, and organisations to connect, collaborate, and stay informed about the latest trends and developments in the tech sector. This ...
How AI is Helping to Strengthen Corporate Cybersecurity

How AI is Helping to Strengthen Corporate Cybersecurity

As AI continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital.
No results found.

In The News

New Research: Almost Half of Australian IT Teams Waste Up to 3-days Per Month Fixing Human Errors, Exposing Organizations to Unnecessary Cyber Risk

New Research: Almost Half of Australian IT Teams Waste Up to 3-days Per Month Fixing Human Errors, Exposing Organizations to Unnecessary Cyber Risk

SYDNEY, Australia, March 4, 2025 – Tanium today released new research highlighting the need for automation to mitigate human error, improve security, and reduce burnout. ‘The Impact of IT Operations Automation on the Morale, Productivity, and Security Posture of IT Teams’ report reveals nearly half of Australian IT teams (43%) are wasting up to 20 ...
A10 Networks Expands its Cybersecurity Portfolio with Acquisition of ThreatX Protect

A10 Networks Expands its Cybersecurity Portfolio with Acquisition of ThreatX Protect

ThreatX Protect Addresses Critical Need to Protect Against Evolving Application and API Security Threats
Hiring Crisis: Surge In AI-generated Resume Causing Aussie Businesses to Miss Out On Top Talent

Hiring Crisis: Surge In AI-generated Resume Causing Aussie Businesses to Miss Out On Top Talent

Hiring crisis: Surge in AI-generated resume causing Aussie businesses to miss out on top talent. Businesses spending almost two working weeks sifting through irrelevant applications for a single role.
Venafi Extends SaaS Machine Identity Security Product Portfolio to Australia

Venafi Extends SaaS Machine Identity Security Product Portfolio to Australia

Venafi, a CyberArk Company, announced today the general availability of its SaaS machine identity security product portfolio, including TLS Protect Cloud, TLS Protect for Kubernetes and Venafi Firefly, in Australia. Hosted and delivered locally within the region via software-as-a-service, Venafi’s machine identity security products will allow ...
Databricks Achieves FedRAMP High Authorization for AWS GovCloud

Databricks Achieves FedRAMP High Authorization for AWS GovCloud

Hires industry veteran Mike Daniels to lead public sector practice amid rapidly growing demand for data intelligence
Veeam Releases Kasten for Kubernetes v7.5 With Enhanced Security and Modern Virtualisation

Veeam Releases Kasten for Kubernetes v7.5 With Enhanced Security and Modern Virtualisation

Veeam announces Veeam Kasten for Kubernetes v7.5, designed to deliver unmatched Kubernetes-native data resilience for enterprises. This latest release improves Kubernetes data protection with significant advancements in scalability, notable improvement in backup and restore times, and features to safeguard against emerging threats and simplify ...
2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises

2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises

The industry’s preeminent source on adversary intelligence exposes a 442% increase in vishing  as GenAI-driven social engineering attacks increase; DPRK insider threats spike
Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550% in 2024

Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550% in 2024

Geopolitics, growing threat surface, and AI-tech drive bigger, longer, more intense attacks
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This