The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
The Glimpse at the Future of Software Academia
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1
From the late 1940s through the 1970s, the concept of software development has its’ origins in ...

‘Captivity Clouds’ – A Trap For Modern Day Security Leaders
Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily ...

Prioritise Foundational Cloud Security Before Leveraging Generative AI
An article around how to prioritise foundational cloud security before leveraging Generative AI.

How Data Quality Is Limiting Your Organisation’s AI Success
Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more than that. We’re now living in a world where holding onto too much data could get you ...

Cybersecurity Budgets and Readiness – Are we there yet?
In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver ...

The Role Of Regulatory Bodies In Safeguarding People From Artificial Intelligence
Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business operations. This focus is driven by a concern for consumer protection, particularly the safety and security of personally identifiable information (PII) and the potential for ...

Business Risk Observability Is Vital For IT Teams To Come Together And Mitigate Security Risks Within Modern Applications
For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate separately from development and operations teams. Security has traditionally been seen as a reactive function within the IT department, there to resolve security breaches and patch up ...

Understanding the Growing Threat Posed by Deep Fakes
With deep fakes becoming an increasing cybersecurity issue, there are seven key strategies that organisations can follow to reduce their chances of falling victim to an attack.
No results found.
In The News
AI Adoption Accelerates in APAC, But Consumers Struggle with Trust, Security, and Job Displacement Concerns
New F5 research reveals an AI paradox, where APAC consumers are enthusiastic about AI’s potential but remain wary of its risks
Building trust through transparency, security, and responsible use is key to driving broader adoption
Inside The Russian-Speaking Underground: The Frontline of Global Cybercrime
Trend Micro’s new research paper highlights cybercriminal underground’s expanding reach
Found Means Fixed: Reduce Security Debt at Scale With GitHub Security Campaigns
Starting today, security campaigns are generally available for all GitHub Advanced Security and GitHub Code Security customers to help them take control of their security debt and manage risk by unlocking collaboration between developers and security teams.
Tenable Commentary: April Patch Tuesday
Microsoft patched 121 CVEs in its April 2025 Patch Tuesday release, with 11 rated critical and 110 rated as important. Elevation of privilege vulnerabilities accounted for 40.5% of the vulnerabilities patched this month, followed by remote code execution vulnerabilities at 25.6%. CVE-2025-29824, an elevation of privilege bug in Windows Common Log File ...
Fastly Unveils DDoS Attack Insights to Strengthen Protection and Security Transparency
New capabilities provide deeper visibility into attack mitigation, helping organisations validate the efficacy of their automated DDoS protection
Sophos Names Chris Bell as Senior Vice President of Global Channel, Alliances and Corporate Development to Lead Next Evolution of Global Channel Strategy
Sophos today announced it has named Chris Bell as senior vice president of global channel, alliances and corporate development, where he will lead the evolution of Sophos’ global channel strategy. This key appointment reinforces Sophos’ channel-first commitment to deliver a world-class partner experience.
Bell joined Sophos following its acquisition ...
Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds
56% of respondents from Australia – higher than the global average (43%) – believe the threat is imminent, disclosing that they have already had to report an act of cyberwarfare. 79% of Australian IT leaders believe that global geopolitical tensions are only worsening the threat. In fact, over half (51%) have experienced more threat activity on their ...
BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions
Company recognised for aggressive technical innovation and advanced features that focus on a platform solution, offering broad functionality and use case support
Report highlights BeyondTrust’s strengths in securing cloud environments by enforcing least privilege access, identifying identity-based risks, and mitigating misconfigurations
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..