The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.
The Future of VPNs? No Where.

The Future of VPNs? No Where.

Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on ‘Zero Trust’. Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...
Predicting The Future – With Kavitha Mariappan

Predicting The Future – With Kavitha Mariappan

What Developments In The Threat Landscape Do Australians Need To Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...
How to Protect Against the Rising Tide of Password Spray Attacks

How to Protect Against the Rising Tide of Password Spray Attacks

Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.
Australian Energy Sector Grappling with Rising Ransomware Threat

Australian Energy Sector Grappling with Rising Ransomware Threat

As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.
Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
How to Innovate in a Privacy-Protective Way

How to Innovate in a Privacy-Protective Way

Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.
Leading Cybersecurity Tech Trends Driving change

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.
No results found.

In The News

Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

IT teams and support desks replacing non-compliant remote access tools are turning to BeyondTrust to help them meet modern security and compliance standards. BeyondTrust Remote Support is compliance-ready, with built-in capabilities to help IT teams align with FIPS, CJIS, FedRamp, and other key security and compliance mandates without added complexity ...
Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable®, the exposure management company, today announced the next evolution of its industry-leading Tenable Vulnerability Priority Rating (VPR) to sharpen precision and focus on risks that pose the greatest threat. Powered by generative AI, enriched threat intelligence and context-aware scoring, Tenable VPR enables organisations to quickly understand ...
Oracle Helps Customers Boost Supply Chain Efficiency with New Advanced Inventory Management Solution

Oracle Helps Customers Boost Supply Chain Efficiency with New Advanced Inventory Management Solution

New capabilities within Oracle Cloud SCM help organisations streamline warehouse operations, simplify inventory transactions, and accelerate order fulfilment
FICO Survey: 7 in 10 APAC bank leaders say scams and mule accounts are now the dominant fraud concern

FICO Survey: 7 in 10 APAC bank leaders say scams and mule accounts are now the dominant fraud concern

Industry poll reveals social media as key scam channel, while data silos hinder bank response
Ericsson powers Telstra’s 5G evolution with Automated Carrier Aggregation on commercial network

Ericsson powers Telstra’s 5G evolution with Automated Carrier Aggregation on commercial network

Ericsson (NASDAQ: ERIC) has marked an industry milestone by deploying Automated Carrier Aggregation in more than 50 of Telstra’s live commercial 5G Advanced sites across North Sydney, making Telstra the first operator to use this feature in a live commercial network environment. The innovative software capability, part of Ericsson 5G Advanced ...
NEW REPORT: 2025 Global Practitioner Survey

NEW REPORT: 2025 Global Practitioner Survey

While AI adoption is accelerating and delivering substantial returns, a new report from Workiva uncovered alarming gaps in data quality, AI governance, and role-specific training for Australian companies. The report summarises the results of an independent global survey of 2,300 finance, sustainability, audit, and risk professionals responsible for ...
Tenable Comment for System Administrator Appreciation Day

Tenable Comment for System Administrator Appreciation Day

System Administrator Appreciation Day on 25 July 2025 is a timely reminder of the critical and often invisible role sysadmins play in keeping the digital world running smoothly. While their work might not always make headlines, it forms the basis for every aspect of modern business operations, from system uptime and network stability to data security ...
Motorola Solutions Debuts ‘AI Nutrition Labels,’ to Boost Transparency in Public Safety Technology

Motorola Solutions Debuts ‘AI Nutrition Labels,’ to Boost Transparency in Public Safety Technology

Company commits to transparently propelling the power of AI in protecting people, property and places
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This