The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Monitoring Can Enhance An Organisation’s Security Protection
Network monitoring is important in maintaining optimal IT infrastructure performance and security. Such software plays a role in monitoring various network parameters, ensuring security through features like overload protection, automatic log out, and prevention of malicious code execution. The critical role of network monitoring in safeguarding ...

Where Australian Organisations Go Wrong With Cyber Risk Quantification
The promise of getting directors, executives and cyber teams all talking the same language can be challenging to accomplish and bring unintended consequences.

Singapore’s Minister Mrs Josephine Teo Discusses Digital Transformation and Women’s Leadership with Oracle’s CEO Safra Catz
Recently at the Oracle CloudWorld Tour held at the Shangri-La in Singapore, Oracle's CEO Safra Catz, Singapore's Minister for Communications and Information and Second Minister for Home Affairs, Mrs Josephine Teo, highlighted the critical role of digital transformation in Singapore's development and shared insights on empowering women in leadership ...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit

The Conversations Boards Should Have About Cybersecurity
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...

Advancing Security and Resilience: Insights from AWS Summit in Sydney
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia
AI - An Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1
From the late 1940s through the 1970s, the concept of software development has its’ origins in ...
No results found.
In The News
Budget Overruns and Security Concerns Persist for Cloud Storage, Finds Wasabi Report
Findings from the third annual Wasabi Global Cloud Storage Index reveal enterprises across Asia Pacific, including Japan, Australia and New Zealand, continue to experience budget overruns due to cloud storage fees. In fact, 49% of end-user cloud storage spending goes to fees for storage and networking, rather than actual storage used. The Wasabi Global ...
Exabeam Named Triple Winner in 2025 Cybersecurity Excellence Awards
Exabeam Secures Top Honors in SIEM, AI Security Solution, and Most Innovative Cybersecurity Company in 2025 Cybersecurity Excellence Awards
NinjaOne Announces New Capabilities to Improve Digital Employee Experience and Productivity
NinjaOne has announced expanded capabilities to help IT teams improve users’ experiences with their devices. The new use cases include self-service workflows, end-user dashboards, and user-centric automations to make organisations and their employees more efficient and productive.
IT leaders are increasingly focusing not only on improving how they ...
CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program
New incentives, tools, training and resources make it easier for partners to consolidate cybersecurity on the Falcon platform, driving larger deals and superior customer outcomes
ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention
Heavy workloads and long hours cited as the top stressors for IT professionals, according to new ISACA research
CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers
CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, ...
Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain
Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds
Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..