The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Shadow Data Is The New Insider Threat: What CISOs Overlook In SaaS Sprawl

Shadow Data Is The New Insider Threat: What CISOs Overlook In SaaS Sprawl

Companies maintain internal databases for sensitive information. However, sometimes employees want to take work home or believe it is easier to save files on their systems. These seemingly minor and understandable oversights introduce a new and growing threat to all industries: Shadow Data. Typical security protocols do not address these scenarios, ...
Smartsheet Achieves 260%+ Customer Growth in Australia As Business Booms Across Asia-Pacific and Japan

Smartsheet Achieves 260%+ Customer Growth in Australia As Business Booms Across Asia-Pacific and Japan

Smartsheet has recorded over 260% customer growth in Australia, driven by surging demand across Asia-Pacific and Japan. The company’s expansion reflects strong regional adoption of its enterprise work management platform, with organisations increasingly turning to Smartsheet to drive productivity, visibility, and collaboration at scale.
The New Priorities Driving Organisations To Uplift Web Application Security

The New Priorities Driving Organisations To Uplift Web Application Security

While compliance ensures steady improvements to application security, the cadence of upgrades is not enough to meet best practice or evolving customer expectations.
Can Cyber Security Be a Platform for Innovation and Growth?

Can Cyber Security Be a Platform for Innovation and Growth?

Six Preparedness and Performance Indicators to Unlock Cyber Agility
Digitally Marked: Australia’s Sensitive Position in the Global Cyberwar

Digitally Marked: Australia’s Sensitive Position in the Global Cyberwar

Strategic advisor at Semperis, Simon Hodgkinson, discussed the ongoing state-sponsored cyberattacks, particularly in Australia. With decades of experience as a cybersecurity leader in software, financial services, and energy industry, Hodgkinson shared valuable perspectives and reflected on previous incidents, highlighting hard-learned lessons and best ...
Is Shadow AI the New Enemy Labyrinth?

Is Shadow AI the New Enemy Labyrinth?

Most Australian companies remain exposed to the round the clock threats, especially those exploiting AI technology. A new survey conducted by Cisco covering 8,000 organisations worldwide, with 301 from Australia unveil a new state of affairs.‘Shadow AI’ as we know it, is the use of unauthorised AI tools by employees, outside the official scrutiny of IT ...
Oracle’s Comeback to the Cloud Arena

Oracle’s Comeback to the Cloud Arena

Oracle, historically perceived as a late entrant in the cloud services market, and more commonly known for its database capability, is now pedalling a bold new trajectory that could reshape the competitive cloud landscape. Since April 2024, Oracle has introduced several major updates such as the DR-25 initiative, which effectively shrinks its ...
Cyber Risk is Business Risk: Qualys Calls For Strategic Shift During Global Cybersecurity Week

Cyber Risk is Business Risk: Qualys Calls For Strategic Shift During Global Cybersecurity Week

Sam Salehi, Managing Director ANZ at Qualys discusses why cyber risk can no longer be treated as a siloed IT issue, but must be addressed as a core business priority. As threat actors move faster and leverage AI to amplify attacks, Salehi highlights the urgent need for organisations to adopt a unified, strategic approach—bringing together security, IT, ...
No results found.

In The News

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Counter Adversary Operations identifies innocuous trigger words that lead DeepSeek to produce more vulnerable code.
BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

Combined solution automates identity decisions across human and non-human identities, strengthening Zero Trust security | Joint offering eliminates identity silos by integrating PAM, IAM, and IGA into a cohesive, AI-driven framework for enhanced visibility, control and governance
Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell (NASDAQ: HON) has been selected by Fitzroy River Water, part of Rockhampton Regional Council, to modernise and automate key water treatment facilities, as part of the Council’s long-term infrastructure improvement program. Rockhampton, located in Central Queensland, relies on Fitzroy River Water to deliver essential water and sewerage ...
Genetec Releases 2026 Global State of Physical Security Report

Genetec Releases 2026 Global State of Physical Security Report

Survey of more than 7,300 professionals reveals: Physical security has evolved into a strategic business function, strengthening IT collaboration and decision-making | Interest in adopting AI more than doubled among end users since last year | Organisations want flexibility to deploy workloads on premises, in the cloud, or in a hybrid model
NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne recently announced NinjaOne Remote®, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, reliable, and secure control over endpoints, wherever they are. The solution is built on a ...
Australia Leads the World in Organisational Concern over Identity Driven Attacks

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Rubrik Zero Labs Issues Latest Study “Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats”
Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility. This is the first time Barracuda has seen an entire phishing framework built around the iframe technique. Threat analysts have been tracking the new PhaaS ...
Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Sophos has announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. As a result, more than half ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This