The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australian Government Launches Comprehensive Cybersecurity Strategy to Protect National Economy
The Australian government has recently unveiled a new cybersecurity strategy designed to bolster the nation's cyber capabilities and protect the economy and its citizens from cyber threats. The policy, led by Minister Clare O'Neil, seeks to make Australian entities harder targets, and to enable faster recovery from cyber attacks.
The government aims ...
Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data
With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo
It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity
A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.

The Unspoken Voice – CFOs Perspective On Security
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...

Cybersecurity Implications of Cryptocurrency and Blockchain Technology
Introduction
This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...

Can Being “Compliant” Ever Top Being “Secure”?
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?

A Look Inside a Cybercriminal Execution Chain
During a cyber attack, the process of compromising a machine rarely involves a single step.
No results found.
In The News
Elastic Awarded A 2024 AWS Partner Award
Elastic recognised as the AWS Global Generative AI Infrastructure and Data Partner of the Year
New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack
NetApp® (NASDAQ: NTAP), the intelligent data infrastructure company, today announced the release of its latest report analysing the state of cybersecurity and offering actionable insights to help organisations strengthen their cyber resiliency. The Futurum Group study, "Cloud, Complexity, AI: The Triple Threat Demanding New Cyber Resilience Strategies" ...
New 2025 Genetec State of Physical Industry Report Shows Australia And New Zealand Accelerating Hybrid Cloud Adoption And IT’s Growing Strategic Influence
Report highlights a purpose-driven approach to cloud and AI adoption.
SYDNEY/AUCKLAND, December 5, 2024 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today shared the results of its 2025 State of the Physical Security Report. Based on insights from over 5,600 physical security leaders worldwide, including more ...
Tenable Adds Patch Management To Rapidly Close Security Exposures – Autonomous Patching Streamlines Discovery To Remediation, With Customisable Controls That Prevent Problematic Updates
Tenable®, the exposure management company, today announced the release of Tenable Patch Management, an autonomous patch solution built to quickly and effectively close vulnerability exposures in a unified solution. A strategic partnership and integration with Adaptiva, a global leader in autonomous endpoint management, provides the foundation of the ...
Cordant Partners with Cloud Security Leader Wiz to Enhance Pragmatic Cybersecurity Solutions in Australian Market
Melbourne, Australia 26th November 2024 - Cordant, Australia's leading pragmatic cybersecurity consultancy, today announced a partnership with Wiz, the rapidly-growing cloud security platform that has revolutionised how organisations protect their cloud infrastructure. This collaboration marks a significant milestone in bringing straightforward, ...
Fortinet Elevates Web Application Security and Performance with New Unified Platform
FortiAppSec Cloud consolidates key web application capabilities into a single offering, providing cutting-edge protection, seamless delivery, and centralised management across multi-cloud environments
Rapid7’s Managed Extended Detection and Response (MXDR) Adds Coverage for Amazon Web Services (AWS) Environments
Rapid7 has expanded its Managed Extended Detection and Response (MXDR) service to include enhanced support for AWS environments. This brings customers deeper cloud detection and response capabilities by combining cloud native telemetry, AWS security telemetry, and enhanced detections in the Rapid7 Command Platform.
Thales Unveils Data Risk Intelligence to Redefine Data Risk Visibility and Proactive Risk Mitigation
Data Risk Intelligence combines posture and behaviour-based data risk indicators to proactively identify and mitigate risks to sensitive data. First solution uniting the data security capabilities from the Imperva Data Security Fabric and Thales CipherTrust Data Security Platforms to provide highly confident data risk prioritisation with clear ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..