The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery

Boosting Confidence In Ransomware Recovery

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
Video Killed the Security Star

Video Killed the Security Star

Exploring the overlooked risk of sensitive info leaks in videos, with examples of real-world breaches like password exposures and crypto key losses.
Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos Report Reveals 86 Per Cent Of Cybersecurity And IT Professionals In Australia Are Impacted By Burnout And Fatigue

Sophos, a global leader in innovating and delivering cybersecurity as a service, released the findings of its fourth “The Future of Cybersecurity in Asia Pacific and Japan” report in collaboration with Tech Research Asia (TRA). The report found that 86 per cent of Australian respondents in cybersecurity and IT roles are impacted by burnout and ...
Compliance and Security: The AI-Powered Identity Revolution

Compliance and Security: The AI-Powered Identity Revolution

The cyber security landscape is grappling with an expanding attack vector as the rise in identities from digitisation has exposed organisations to increased vulnerabilities. The challenge is most organisations haven’t yet implemented a comprehensive identity security strategy to help manage the access for hundreds to thousands of identities, with ...
A New Cyber Battleground, Australian Resilience And Adaptation Will Shine Through

A New Cyber Battleground, Australian Resilience And Adaptation Will Shine Through

In the face of these technological shifts, Australia and New Zealand will showcase their resilience and adaptability in 2024. Local businesses and cybersecurity experts are gearing up to tackle the challenges head-on, recognising the importance of staying ahead in an ever-changing digital landscape. As we step further into the new year, the region’s ...
No results found.

In The News

CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program

CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program

New incentives, tools, training and resources make it easier for partners to consolidate cybersecurity on the Falcon platform, driving larger deals and superior customer outcomes
ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention

ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention

Heavy workloads and long hours cited as the top stressors for IT professionals, according to new ISACA research
CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, ...
Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

All finalists are members of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their security products and services with Microsoft’s security technology.
SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge integrates seamlessly with enterprise SIEM and ITSM solutions, offering built-in SAP security monitoring rules customized to fit organizational needs.
Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud

Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud

Proofpoint, Inc., a leading cybersecurity and compliance company, has today released new research showing almost one in four (23%) of Australia’s top-ranked hospitals is still lagging behind on basic cybersecurity measures, subjecting patients, healthcare professionals, and stakeholders to a higher risk of email fraud. While the data shows some ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This