The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australian Energy Sector Grappling with Rising Ransomware Threat

Australian Energy Sector Grappling with Rising Ransomware Threat

As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.
Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
How to Innovate in a Privacy-Protective Way

How to Innovate in a Privacy-Protective Way

Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.
Leading Cybersecurity Tech Trends Driving change

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.
Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
No results found.

In The News

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks, a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today presents the 32nd edition of the Technology Radar. The biannual report is built on Thoughtworks’ frontline experiences solving its clients’ most complex business challenges. The latest edition of the Thoughtworks ...
SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds (NYSE:SWI), a leading provider of simple, powerful, and secure observability and IT management solutions, today announced a major step forward in helping businesses achieve IT operational resilience. The latest enhancements across the SolarWinds portfolio integrate expanded capabilities across observability, incident response, service ...
CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced that CyberArk Secure Browser has achieved SOC 2 Type 2 Compliance, underscoring CyberArk’s commitment to apply the right level of privilege controls to secure every user’s action, from endpoint to application. This certification confirms that CyberArk Secure Browser uses ...
New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

Generative AI ‘gray bots’ pound websites up to half a million times a day Generative AI scraper bots target websites 24 hours a day with up to half a million requests for information, according to the latest Barracuda detection data. In a new report, Barracuda threat analysts highlight the relentless behaviour of generative AI (Gen AI) bots, which ...
Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Collaboration enables customers to easily switch to Delinea’s advanced CIEM solution, safeguarding human and machine identities in public, multi-cloud environments
Datadog Unveils Plans for Data Centre in Australia

Datadog Unveils Plans for Data Centre in Australia

Datadog today announced plans for a new data centre to be located in Australia. The data centre instance, which will be built on AWS, will be Datadog’s first in Australia and adds to existing locations in North America, Asia, Europe and AWS GovCloud. The Australian data centre will store and process data locally, creating sovereign capacity to help ...
Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This