The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats

New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats

Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.
Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted

Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted

Annual Phishing Report Highlights New and Evolving Phishing Campaigns Resulting from the Rise of AI Platforms, like ChatGPT, Urges Organisations to Adopt a Zero Trust Architecture
How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

Amidst an environment of ever-increasing digital threats, growing numbers of organisations are turning to cyber insurance as a means of protecting against the fallout from attacks.
60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

As cloud adoption continues to surge, with a projected market size of $830 billion in 2025, threat actors are increasingly targeting common vulnerabilities in the cloud.
Why SaaS Security Needs to Receive Constant Attention

Why SaaS Security Needs to Receive Constant Attention

ured by the promise of lower operating costs and improved flexibility, many businesses are continuing to increase their usage of software-as-a-service (SaaS) offerings.
Telecommunications Asset Deployments

Telecommunications Asset Deployments

The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives. The foundational infrastructure that allows the communication between devices and the collection of this data for processing and interpretation ...
F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5’s latest Curve of Convenience report shows, in the event of a data leak, majority of A/NZ consumers are unwilling to continue buying from the company involved (71%). Most of A/NZ (89%) are not comfortable with tracking mechanisms in their digital usage.
ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

Updated CMMI version addresses data management, people management, and remote/virtual workforce effectiveness.

In The News

Latest FedRAMP® Authorisation Increases Trend Micro’s Leadership as the Most Globally Compliant Cybersecurity Platform

Latest FedRAMP® Authorisation Increases Trend Micro’s Leadership as the Most Globally Compliant Cybersecurity Platform

Enterprises and governments worldwide rely on Trend to bridge the gap between security and compliance
Vulnerabilities identified in Bosch BCC100 Thermostat

Vulnerabilities identified in Bosch BCC100 Thermostat

Several factors underscore the importance of smart thermostats: energy efficiency, environmental sustainability, and the spread of smart home technologies. These devices have a major impact on energy conservation and its associated cost savings, while making homes noticeably more comfortable. This combination of energy efficiency, convenience and ...
Forescout is a Proud Participant in the Microsoft Security Copilot Partner Private Preview

Forescout is a Proud Participant in the Microsoft Security Copilot Partner Private Preview

SYDNEY, Australia, January 10, 2024 – Forescout, a global cybersecurity leader, today announced its participation in the Microsoft Security Copilot Partner Private Preview. Forescout was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close ...
New Cloudflare Report Shows Organisations Struggle to Identify and Manage Cybersecurity Risks of APIs

New Cloudflare Report Shows Organisations Struggle to Identify and Manage Cybersecurity Risks of APIs

Insights reveal that while APIs account for the majority of Internet traffic, they remain largely unsecured
Palo Alto Networks Recognised as a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

Palo Alto Networks Recognised as a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

January 15th - Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced today that it has been positioned as a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP). Palo Alto Networks provides a feature-rich EPP as part of Cortex XDR®, which is designed to prevent the latest endpoint threats. As the ...
Vulnerabilities on Bosch Rexroth Nutrunners May be Abused to Stop Production Lines, Tamper With Safety-Critical Tightenings

Vulnerabilities on Bosch Rexroth Nutrunners May be Abused to Stop Production Lines, Tamper With Safety-Critical Tightenings

SYDNEY, January 10, 2023 – As production lines become increasingly reliant on interconnected computer systems, the risk of cybercriminal exploitation looms large. Nozomi Networks has detailed new vulnerabilities discovered in the Bosch Rexroth NXA015S-36V-B, a popular smart nutrunner (pneumatic torque wrench) used in automotive production lines. We ...
Genesys Cloud CX Can Now Be Operated to IRAP PROTECTED Level to Optimise Customer Experience for Australian Government Agencies

Genesys Cloud CX Can Now Be Operated to IRAP PROTECTED Level to Optimise Customer Experience for Australian Government Agencies

Global cloud leader in AI-powered- experience orchestration, Genesys® has announced its all-in-one Genesys Cloud CX® platform can be operated to IRAP PROTECTED level, receiving an upgrade from its previous “Official Sensitive” level. The qualified, independent, third-party assessment by the Information Security Registered Assessors Program (IRAP) ...
New Guide Offers Solutions to Tech Talent Gap

New Guide Offers Solutions to Tech Talent Gap

Report finds recognising refugees’ and migrants’ skills would boost economy.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This