The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise
Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.
The Role of Data And AI In Cyber Defence
With cyber-attacks are becoming increasingly sophisticated and frequent, thereโs a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from automating threat detection, analysing vast amounts of data for anomalies, and responding to potential breaches in real-time as well as providing a more effective response which ...
Taking A Borderless Approach To Cybersecurity Governance
Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all sectors.
With attacks becoming more frequent and sophisticated, thereโs a compelling need ...
Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch
Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices.
Addressing Lateral Movement Threats Against Australian Entities
With Australian and international authorities calling out lateral movement incidents multiple times this year, itโs clearly an area where improvements are being urgently sought.
A key trend to gain momentum this year was the issuance of multi-country-led advisories outlining the tradecraft of threat groups striking both Australian and allied ...
Top Ten List: Reasons to Use Microsegmentation
Learn the top 10 reasons to implement microsegmentation in your cybersecurity strategy. Protect against malware, ransomware, and insider threats today.
How SecOps Can Leverage AI And Automation For Faster, Smarter Incident Management
Managing modern cyber threats is becoming tougher for security operations (SecOps) teams. Attack surfaces are expanding, and threats are becoming more sophisticated. Fortunately, artificial intelligence (AI) and automation provide the speed, precision, and efficiency that manual methods can no longer match.ย
Cornelius Mare, chief information security ...
Why Microsegmentation is the Key to Containing Breaches in Todayโs Cybersecurity Landscape
Discover why microsegmentation is vital for breach readiness. Learn how it prevents lateral movement, protects sensitive data, and ensures business continuity amidst evolving cyber threats.
In The News
Nozomi Networks and Advens Team to Deliver Advanced Cybersecurity Services to Industrial and Critical Infrastructure Environments
โข Nozomi Networks OT and IoT visibility, threat detection and risk management capabilities now part of Advens Managed Security Services offered to customers countries across Europe โข Paris Olympics joins a growing list of customers benefiting from this MSSP partnership
SecurityBridge Partners with Altum Strategy Group to Bridge SAP Security Gaps For Small and Medium-Sized Businesses
By addingย SecurityBridgeโs solution,ย Altumย will now offer its customers the ability to address SAPย securityย withย Altumโs deep expertise and strategic thinking andย SecurityBridgeโs cybersecurity solution.ย
OpenText Partners with Secure Code Warrior to Deliver Comprehensive Application Security and Customised Developer Risk Management
The new agreement empowers development teams with continuous upskilling to turn security into a strategic advantage, reduce risks, and elevate customer trust
Elastic Awarded A 2024 AWS Partner Award
Elastic recognised as the AWS Global Generative AI Infrastructure and Data Partner of the Year
New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack
NetAppยฎ (NASDAQ: NTAP), the intelligent data infrastructure company, today announced the release of its latest report analysing the state of cybersecurity and offering actionable insights to help organisations strengthen their cyber resiliency. The Futurum Group study, "Cloud, Complexity, AI: The Triple Threat Demanding New Cyber Resilience Strategies" ...
New 2025 Genetec State of Physical Industry Report Shows Australia And New Zealand Accelerating Hybrid Cloud Adoption And IT’s Growing Strategic Influence
Report highlights a purpose-driven approach to cloud and AI adoption.
SYDNEY/AUCKLAND, December 5, 2024 โ Genetec Inc. (โGenetecโ), the global leader in enterprise physical security software, today shared the results of its 2025 State of the Physical Security Report. Based on insights from over 5,600 physical security leaders worldwide, including more ...
Tenable Adds Patch Management To Rapidly Close Security Exposures – Autonomous Patching Streamlines Discovery To Remediation, With Customisable Controls That Prevent Problematic Updates
Tenableยฎ, the exposure management company, today announced the release of Tenable Patch Management, an autonomous patch solution built to quickly and effectively close vulnerability exposures in a unified solution. A strategic partnership and integration withย Adaptiva, a global leader in autonomous endpoint management, provides the foundation of the ...
Cordant Partners with Cloud Security Leader Wiz to Enhance Pragmatic Cybersecurity Solutions in Australian Market
Melbourne, Australia 26th November 2024 - Cordant, Australia's leading pragmatic cybersecurity consultancy, today announced a partnership with Wiz, the rapidly-growing cloud security platform that has revolutionised how organisations protect their cloud infrastructure. This collaboration marks a significant milestone in bringing straightforward, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..