The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...
Breaking Down Barriers to Cybersecurity Frameworks

Breaking Down Barriers to Cybersecurity Frameworks

Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s Essential Eight, effectively.   The complexity of deployment, the need for a cultural ...
Security is Not a Zero-Sum Game

Security is Not a Zero-Sum Game

The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong and when they do - our whole world turns with it. Jeetu Patel, Executive Vice President & Chief Product Officer at Cisco, discussed his strong stance against monopolies in the tech industry and his view on collaboration and ...
The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity

The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity

The article talks to the importance and urgency of Real-Time Cyber Asset Risk Reporting in today’s threat landscape. It highlights Australian statistics, touching on increases in attack frequency, targeted industries, and the financial impact on Australian businesses, and how Australian business may be lagging behind in their defences, and touches on ...
Scams and The Critical Role for Australian Banks

Scams and The Critical Role for Australian Banks

Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission's report Australians lost AUD $2.74 billion to scams in 2023 - although this was a welcome decline compared to 2022 (AU$3.15 billion lost) it is still alarmingly ...
Sustainability in Business is More than a Reusable Coffee Cup

Sustainability in Business is More than a Reusable Coffee Cup

When people hear sustainability, some might straight away think - oh yes a reusable coffee cup. Perhaps, however in this context we’re talking about sustainability within tech businesses and what does this mean and more importantly - what does that look like?Luke Hargreaves, Founder and CEO from Aquainnis chatted to me about the urgent need for ...
How To Quickly Kick Start Holistic SAP Security

How To Quickly Kick Start Holistic SAP Security

SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.
No results found.

In The News

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

A new IDC InfoBrief, “Agentic Automation: Unlocking Seamless Orchestration for the Modern Enterprise”, sponsored by UiPath (NYSE: PATH), a global leader in agentic automation, has revealed 41% of Australian organisations are already using agentic AI and another 50% are planning to use it in the next six months.
CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

Recognition Cites CyberArk’s Innovation Focus, Platform Capabilities and Bold Vision 
Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Company positioned closest to the centre of the Radar, underscoring its ability to help customers understand their dynamic cloud environments beyond the capacity of competitive solutions
Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

ISACA, the global professional association supporting digital trust professionals, has announced the appointment of Australian cybersecurity expert Jamie Norton as Vice Chair of its 2025–2026 Board of Directors. Norton, currently Chief Information Security Officer (CISO) for the Australian Securities and Investments Commission (ASIC), steps into the ...
Fortinet expands FortiCloud with identity, secure storage, and communication services to power the modern enterprise

Fortinet expands FortiCloud with identity, secure storage, and communication services to power the modern enterprise

New services enhance identity management, secure file storage and recovery, and communication, advancing the Fortinet Security Fabric and global cloud network vision 
Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Bug bounty program incentivises security research to make customers and industry safer 
Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic AI SOC Engine (EASE) reduces alert fatigue and investigation time by integrating context-aware AI with existing SIEM and EDR tools
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This