The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australian Government Launches Comprehensive Cybersecurity Strategy to Protect National Economy
The Australian government has recently unveiled a new cybersecurity strategy designed to bolster the nation's cyber capabilities and protect the economy and its citizens from cyber threats. The policy, led by Minister Clare O'Neil, seeks to make Australian entities harder targets, and to enable faster recovery from cyber attacks.
The government aims ...
Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data
With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo
It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity
A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.

The Unspoken Voice – CFOs Perspective On Security
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...

Cybersecurity Implications of Cryptocurrency and Blockchain Technology
Introduction
This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...

Can Being “Compliant” Ever Top Being “Secure”?
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?

A Look Inside a Cybercriminal Execution Chain
During a cyber attack, the process of compromising a machine rarely involves a single step.
In The News
SecurityBridge’s Bill Oliver Selected By ASUG Organizers To Discuss SAP Cybersecurity Best Practices
Company Reveals It’s New “Cybersecurity Command Center for SAP” Initiative at the Houston, TX, Event
Recorded Future Unveils AI-Driven Enhancements to Combat Ransomware Threats with Real-Time Intelligence
AI-Powered Threat Intelligence Delivers Enhanced Visibility, Faster Detection, and Proactive Response Across the Entire Ransomware Lifecycle
Fortinet Expands Its Cloud-Native Security Offerings With The Introduction Of Lacework FortiCNAPP
Combining Lacework’s leading cloud-native application protection platform with the Fortinet Security Fabric delivers unmatched visibility and protection across multi-cloud environments
AusCERT Launches New Tabletop Exercise Service To Boost Incident Response Readiness
AUSCERT'S new TTX service enables organisations of all sizes to focus on critical aspects of cyber incident response, business continuity and crisis management and uplift capabilities.
Tesserent Highlights Significant Pivot From NIST On Password Advice – Australian Businesses, Public Sector And Consumers Advised Not To Bother With Complex Passwords
Tesserent highlights significant pivot from NIST on password advice – Australian businesses, public sector and consumers advised not to bother with complex passwords
Genetec Retains World Leader Position In Video Management Software, Analysts Confirm
Ongoing innovation, open architecture, and hybrid cloud solutions underpin sustained global market leadership.

Patch Tuesday Commentray from Tenable
This month, Microsoft addresses 117 CVEs with three rated as critical and four zero-day vulnerabilities, two of which were exploited in the wild. Remote code execution (RCE) vulnerabilities accounted for 35.9% of the vulnerabilities patched this month, followed by elevation of privilege (EOP) vulnerabilities at 23.9%. Please find below a comment from ...
Cythera Achieves ISO 27001 Security Certification And Invests In MDR Services
Melbourne, 9 October 2024 - Cythera, a leading Australian cybersecurity service provider, today announced it has achieved ISO 27001 certification, demonstrating its commitment to the highest standards of information security management. The company also revealed significant enhancements to its Managed Detection and Response (MDR) service, offering ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..