The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Unified Native Solutions and AI Change the Security Cloud Battleground

How Unified Native Solutions and AI Change the Security Cloud Battleground

An Overview The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers numerous benefits, it also introduces new challenges and risks that require fundamentally rethinking our cybersecurity strategies. The cloud's appeal lies in its ability to democratise access to powerful computing resources, ...
Five Steps For New Zealand Businesses To Effectively Manage Incident Response

Five Steps For New Zealand Businesses To Effectively Manage Incident Response

With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will respond to a cybersecurity incident. In the last year, data breaches and other attacks ...
Growing Sustainability Through Colocation Services

Growing Sustainability Through Colocation Services

How colocation hybrid cloud solutions are supporting the transition to more sustainable and environmentally conscious technology solutions for business.

5 Steps for Securing Your Software Supply Chain

. Our dependency on open-source component is going to increase over time and implementing these five steps will help secure your organisation's software supply chain.
Why Developers Need Security Skills To Effectively Navigate AI Development Tools

Why Developers Need Security Skills To Effectively Navigate AI Development Tools

The future is a human-AI partnership for secure code development.
Fish In a Barrel – Australia’s At-risk Cleared Personnel

Fish In a Barrel – Australia’s At-risk Cleared Personnel

“I appreciate people want to sell themselves to prospective employers, and may need to mention they have a security clearance, but doing it on a professional networking site is reckless.” Mike Burgess, Director-General of Security of Australia.
Why Identity Management is Critical for Effective IT Security

Why Identity Management is Critical for Effective IT Security

Organisations should follow several key steps to ensure that identity credentials are secure and user authorisations are appropriate.
CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a response back to the source IP address, it is sent to the fake source IP address ...
No results found.

In The News

CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

Mutual customers will benefit from boosted endpoint threat detection and response capabilities
Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Unified security and observability enable continuous compliance and response automation for major cloud platforms LAS VEGAS, NV, February 4, 2025 – Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises ...
Do The CONTEC CMS8000 Patient Monitors Contain A Chinese Backdoor? The Reality Is More Complicated

Do The CONTEC CMS8000 Patient Monitors Contain A Chinese Backdoor? The Reality Is More Complicated

On 30 January, The Cybersecurity Infrastructure & Security Agency (CISA) released an alert, complemented by a notification from the U.S. Food and Drug Administration (FDA) suggesting that the Contec CMS8000 patient monitor and OEM white-label variants contain a backdoor communicating to a Chinese IP address. Team82 investigated the firmware and ...
New Research From Claroty’s Team82 Highlights Urgent Ransomware And Insecure Connectivity Threats To Mission-Critical OT Assets

New Research From Claroty’s Team82 Highlights Urgent Ransomware And Insecure Connectivity Threats To Mission-Critical OT Assets

State of CPS Security 2025: OT Exposures” Reveals the OT Device Exposures Most Coveted for Exploitation by Adversaries SYDNEY, Australia, 5 February 2025 – Claroty, the cyber-physical systems (CPS) protection company, today released a new report revealing the exposures that are most coveted for exploitation by adversaries in operational technology ...
GitHub Brings Data Residency To Australia With GitHub Enterprise Cloud

GitHub Brings Data Residency To Australia With GitHub Enterprise Cloud

GitHub, the most widely adopted Copilot-powered developer platform, now offers organisations in Australia more control over where their code is stored
Check Point Announces New AI-Powered Innovations To Bolster Unified Security Management For The Infinity Platform

Check Point Announces New AI-Powered Innovations To Bolster Unified Security Management For The Infinity Platform

Six new capabilities reduce complexity, enhance threat prevention, and set the stage for autonomous zero trust across the Infinity Platform Vienna, Austria – February 4, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced new Infinity Platform capabilities to accelerate ...
SolarWinds Unveils New Features In 2025 Partner Program

SolarWinds Unveils New Features In 2025 Partner Program

SYDNEY, Australia. 5 February 2024. – SolarWinds (NYSE:SWI), a leading provider of simple, powerful, secure observability and IT management software, unveils the next phase of enhancements to the SolarWinds Partner Program. These updates focus on three key areas: increasing partner profitability, partner capabilities, and providing partners with the ...
Informatica CDO Survey Reveals Australian Organisations Face Challenges Moving GenAI Pilots into Production While Optimism Prevails

Informatica CDO Survey Reveals Australian Organisations Face Challenges Moving GenAI Pilots into Production While Optimism Prevails

New report highlights key barriers hindering AI adoption and investment growth
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This