The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day

Rome was not Built in a Day. Security is not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture

Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
No results found.

In The News

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

SYDNEY, August 13, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security ...
Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Site reliability engineers and developers gain access to powerful log analytics without the overhead of managing Elastic Stack
New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

A new industry study has quantified the potential global financial impact of operational technology (OT) cyber incidents at up to US $329.5 billion in a severe but plausible scenario, with business interruption losses accounting for more than half that amount.
Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This