The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
Ensuring Secure Content in the Era of Digital Transformation

Ensuring Secure Content in the Era of Digital Transformation

Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.   As creating and sharing documents from anywhere ...
Boosting Software Security With a Binary Approach

Boosting Software Security With a Binary Approach

Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters. The access token, discovered by the JFrog Security Research ...
The Goal Is To Alleviate The Administrative Burden In Healthcare

The Goal Is To Alleviate The Administrative Burden In Healthcare

Stephanie Trunzo, Senior Vice President and General Manager at Oracle Industry. Trunzo dives deep into the changes Oracle Industries is bringing to the healthcare sector with applied AI and an open healthcare platform and what this actually means. Trunzo led with Oracle Industries' approach, which integrates specific industry needs into general ...
A Pledge to Secure Healthcare

A Pledge to Secure Healthcare

Discover why hospitals and healthcare providers are prime targets for cyberattacks and how strategies like microsegmentation can ensure patient safety.
Building Bridges with Hyperscalers

Building Bridges with Hyperscalers

Investing in strategic relationships is what drives NetApp and their success in the cloud space. According to Pravjit Tiwana, Senior Vice President, General Manager of Cloud Storage at NetApp walked through their view to building bridges with the major cloud providers, often referred to as hyperscalers. "We are the only first party cloud storage ...
Pravjit Tiwana – SVP, GM Cloud Storage

Pravjit Tiwana – SVP, GM Cloud Storage

Watch The Interview  Biography Pravjit (Prav) Tiwana is a technology executive with more than two decades of experience building highly scaled, cloud-powered products, services, and businesses. He is senior vice president and general manager responsible for accelerating NetApp’s Cloud Storage business across hyperscalers Azure, AWS, and GCP. He ...
Balancing Privacy and Safety: A Complex Necessity

Balancing Privacy and Safety: A Complex Necessity

In a recent panel discussion hosted at South by Southwest more commonly known as SXSW, cybersecurity and privacy experts from various fields convened to discuss the intricate balance between privacy and safety in the digital world. This discussion, moderated by Dr Toby Feakin featured insights from renowned figures including Julie Inman Grant at ...
No results found.

In The News

Capture The Bug Achieves CREST Penetration Testing Accreditation in Australasia

Capture The Bug Achieves CREST Penetration Testing Accreditation in Australasia

Capture The Bug, a leading Penetration Testing as a Service (PTaaS) platform, is proud to announce its official CREST Penetration Testing accreditation in Australasia. This significant milestone demonstrates our commitment to delivering the highest standards of cybersecurity testing across Australia and New Zealand, placing Capture The Bug among an ...
New Sophos Report Finds AI Adoption and Increased Threat Activity Amongst Drivers Keeping Cybersecurity Burnout High In Australia in 2025

New Sophos Report Finds AI Adoption and Increased Threat Activity Amongst Drivers Keeping Cybersecurity Burnout High In Australia in 2025

Shadow AI, resource and budget shortages and meeting compliance and regulatory requirements put pressure on security teams
Claroty Achieves AWS Manufacturing and Industrial Competency for OT Security

Claroty Achieves AWS Manufacturing and Industrial Competency for OT Security

Claroty achieves AWS Manufacturing and Industrial Competency for OT Security. Achievement highlights company’s ability to provide unrivalled OT expertise for securing mission-critical infrastructure.
Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

New detection feature helps educators detect potential AI misuse
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats
CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

Replaces legacy SSO with CyberArk to enable secure, frictionless workforce access
HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech’s VaultNXT powered by Rubrik provides ransomware detection and remediation, ensuring data integrity for complete cyber resilience
Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years. “While patches are available for ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This