The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...

Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture
A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation
There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?
Introduction
In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...

Breaking Down Barriers to Cybersecurity Frameworks
Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s Essential Eight, effectively.
The complexity of deployment, the need for a cultural ...

Security is Not a Zero-Sum Game
The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong and when they do - our whole world turns with it.
Jeetu Patel, Executive Vice President & Chief Product Officer at Cisco, discussed his strong stance against monopolies in the tech industry and his view on collaboration and ...

The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity
The article talks to the importance and urgency of Real-Time Cyber Asset Risk Reporting in today’s threat landscape. It highlights Australian statistics, touching on increases in attack frequency, targeted industries, and the financial impact on Australian businesses, and how Australian business may be lagging behind in their defences, and touches on ...

Scams and The Critical Role for Australian Banks
Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission's report Australians lost AUD $2.74 billion to scams in 2023 - although this was a welcome decline compared to 2022 (AU$3.15 billion lost) it is still alarmingly ...
No results found.
In The News
Digital Resilience Launches SecMatters
A New Model for Client-Led Security Operations
Trend Micro Warns of Thousands of Exposed AI Servers
Latest research reveals mounting infrastructure-level risks from diverse components
Nozomi Networks Labs Report Finds Australia the fourth most targeted country
The latest Nozomi Networks Labs OT & IoT Security Report released today finds Australia the fourth most targeted country. The report assesses the operational technology (OT) and Internet of Things (IoT) threat landscape to provide insights into how industrial organisations and critical infrastructure are being targeted by cyberattacks. Leveraging a ...
Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform
Tenable One now connects more of the security stack than any other exposure management platform, empowering customers with unmatched context into their cyber exposure
FieldEx Leverages Datadog to Enhance Resilience and Operational Efficiency
Malaysian startup scaled operations and streamlined issue detection and alerting using Datadog’s comprehensive cloud observability platform
Rapid7 Launches Incident Command: AI-Native SIEM Empowers Analysts to Act with Speed and Precision from Risk to Response
Rapid7 has launched Incident Command, a next-gen SIEM built on its Command Platform to transform how security teams detect, investigate, and respond to threats. Powered by SOC-tested Agentic AI, it unifies threat detection, exposure management, automation, and curated threat intelligence in a single interface.
Australian IT Teams Spend A Quarter of Their Week on Outages, Yet Report Strong Resilience
New SolarWinds Report Reveals a Gap A Perception Gap, As Many Local IT Teams Struggle With Processes, Staffing, and Technology Readiness
Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface
Active Patching, a fully automated patching and remediation solution integrated into Rapid7’s Exposure Command solution. Powered by Automox, it empowers security and IT teams to proactively mitigate risk across vulnerable assets.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
