The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Singapore’s Minister Mrs Josephine Teo Discusses Digital Transformation and Women’s Leadership with Oracle’s CEO Safra Catz
Recently at the Oracle CloudWorld Tour held at the Shangri-La in Singapore, Oracle's CEO Safra Catz, Singapore's Minister for Communications and Information and Second Minister for Home Affairs, Mrs Josephine Teo, highlighted the critical role of digital transformation in Singapore's development and shared insights on empowering women in leadership ...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit

The Conversations Boards Should Have About Cybersecurity
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...

Advancing Security and Resilience: Insights from AWS Summit in Sydney
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia
AI - An Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1
From the late 1940s through the 1970s, the concept of software development has its’ origins in ...

‘Captivity Clouds’ – A Trap For Modern Day Security Leaders
Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily ...

Prioritise Foundational Cloud Security Before Leveraging Generative AI
An article around how to prioritise foundational cloud security before leveraging Generative AI.
No results found.
In The News
Semperis and Akamai Collaborate to Combat High-Severity Vulnerability in Windows Server 2025
Semperis and Akamai Collaborate to Combat High-Severity Active Directory Vulnerability in Windows Server 2025
Semperis Enhances DSP with Indicators to Detect and Mitigate BadSuccessor Exploits
Sydney, Australia — 10 June, 2025 — Semperis, a leader in AI-powered identity security and cyber resilience, today announced new detection capabilities in ...
BeyondTrust Celebrates Partner Success With Australian Partner Regional Awards
Sydney – 10 June, 2025 – BeyondTrust, the global cybersecurity leader protecting Paths to Privilege™, has announced the winners of its 2024 Australian partner awards at the company’s regional PartnerTrust Live event staged last week in Melbourne.
As part of a day of enablement and positioning partners for growth, subject matter experts from ...
Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report
Report finds 65% of organisations suffered a cloud-security incident in the past year – yet only 6% remediated it within an hour
Redwood City, CA – June 5, 2025 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of ...
Check Point Software Technologies Expands Comprehensive Cybersecurity Portfolio on Pax8 Marketplace
SYDNEY, NSW (June 10, 2025) – Pax8, the leading cloud commerce Marketplace, today announced that Check Point Software Technologies (NASDAQ: CHKP) is significantly expanding its presence on the Pax8 Marketplace by expanding its cybersecurity portfolio available to partners. This expansion provides Pax8's global partner ecosystem with access to Check ...
Claroty Unveils New xDome Platform
Claroty Introduces New Impact-centric Approach to CPS Risk Reduction with Device Purpose and Risk Benchmarking Capabilities
Organisations Can Now Prioritise CPS Remediation Efforts Based on Potential Impact to Business Outcomes
Bitdefender Launches Powerful Compliance Management Solution Unified With Endpoint Security
Bitdefender today announced GravityZone Compliance Manager, a new addition to its GravityZone platform that helps organisations reduce the burden of compliance and streamline audit readiness. Designed specifically for today’s complex regulatory landscape, the solution provides real-time visibility, automated remediation, audit-ready reports, and ...
Fortinet Launches Cybersecurity Curriculum for Classrooms in Australia to Strengthen Digital Resilience in Education
Fortinet showcases free, education-focused training service that builds foundational cyber awareness among students at the 2025 AIS NSW ICT Management and Leadership Conference – Digital Directors
New Research Shows ANZ Security Leaders Are Optimistic about AI Agents, But Trust and Compliance Are Key
IT security leaders across ANZ expect AI agents to be beneficial, yet most see significant readiness gaps in deploying proper safeguards
As AI adoption accelerates and cyber threats increase, 75 per cent of Australian and New Zealand (ANZ) IT security leaders recognise their security practices need transformation. New data from the latest ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..