The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Security is Not a Zero-Sum Game

Security is Not a Zero-Sum Game

The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong and when they do - our whole world turns with it. Jeetu Patel, Executive Vice President & Chief Product Officer at Cisco, discussed his strong stance against monopolies in the tech industry and his view on collaboration and ...
The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity

The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity

The article talks to the importance and urgency of Real-Time Cyber Asset Risk Reporting in today’s threat landscape. It highlights Australian statistics, touching on increases in attack frequency, targeted industries, and the financial impact on Australian businesses, and how Australian business may be lagging behind in their defences, and touches on ...
Scams and The Critical Role for Australian Banks

Scams and The Critical Role for Australian Banks

Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission's report Australians lost AUD $2.74 billion to scams in 2023 - although this was a welcome decline compared to 2022 (AU$3.15 billion lost) it is still alarmingly ...
Sustainability in Business is More than a Reusable Coffee Cup

Sustainability in Business is More than a Reusable Coffee Cup

When people hear sustainability, some might straight away think - oh yes a reusable coffee cup. Perhaps, however in this context we’re talking about sustainability within tech businesses and what does this mean and more importantly - what does that look like?Luke Hargreaves, Founder and CEO from Aquainnis chatted to me about the urgent need for ...
How To Quickly Kick Start Holistic SAP Security

How To Quickly Kick Start Holistic SAP Security

SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.
Exclusive: Zero Trust Security – The way Forward for IT and Security

Exclusive: Zero Trust Security – The way Forward for IT and Security

In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope

Deepfakes and the US Election | A Slippery Slope

The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
No results found.

In The News

New Claroty Research – 89% of Healthcare Orgs Use High-Risk Medical Devices Containing Known Security Vulnerabilities

New Claroty Research – 89% of Healthcare Orgs Use High-Risk Medical Devices Containing Known Security Vulnerabilities

Claroty, the cyber-physical systems (CPS) protection company, today released new research on the riskiest exposures to connected medical devices most coveted for exploitation by adversaries. Based on analysis of over 2.25 million Internet of Medical Things (IoMT) and 647,000-plus operational technology (OT) devices across 351 healthcare organisations, ...
New Trustwave Research Finds Patient Lives at Risk In Healthcare With Cybersecurity Vulnerabilities

New Trustwave Research Finds Patient Lives at Risk In Healthcare With Cybersecurity Vulnerabilities

March 27, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the healthcare sector. The combination of highly-sensitive patient data, legacy systems, increasing reliance on telehealth services, and more connected devices, means healthcare is a prime target for ...
The Great AI Divide: New Survey Finds Financial Services Leaders Struggle with Data Governance and Infrastructure Demands

The Great AI Divide: New Survey Finds Financial Services Leaders Struggle with Data Governance and Infrastructure Demands

Hitachi Vantara report reveals 84% of leaders fear catastrophic data loss as AI strains infrastructure and 41% say AI is already a critical part of their function
Proofpoint Establishes Global Strategic Alliance with Microsoft to Build on Azure and Strengthen Human-Centric Cybersecurity for Organisations

Proofpoint Establishes Global Strategic Alliance with Microsoft to Build on Azure and Strengthen Human-Centric Cybersecurity for Organisations

Companies deepen technology collaboration by making Azure the platform for Proofpoint innovation, providing joint customers with more powerful, seamless human-centric security
Trend Micro Customers Lower Cyber Risk Scores Through Proactive Security

Trend Micro Customers Lower Cyber Risk Scores Through Proactive Security

Newly published report harnesses data from Trend’s platform insights on cyber risk
Fastly Empowers Organisations to Prioritise Security Without Disrupting End-User Experiences

Fastly Empowers Organisations to Prioritise Security Without Disrupting End-User Experiences

Latest Fastly Bot Management update reduces CAPTCHA reliance, enhances bot detection, and highlights compromised credentials
Confluent launches Tableflow to power AI and next-gen applications

Confluent launches Tableflow to power AI and next-gen applications

Data streaming company Confluent has announced today major advancements in Tableflow, the simplest  way to access operational data from data lakes and warehouses. With Tableflow, all streaming data in Confluent Cloud can be accessed in popular open table formats, unlocking limitless possibilities for advanced analytics, real-time artificial ...
Shedding Light On the ABYSSWORKER Driver

Shedding Light On the ABYSSWORKER Driver

Elastic Security Labs describes ABYSSWORKER, a malicious driver used with the MEDUSA ransomware attack-chain to disable anti-malware tools.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This