The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Nozomi Networks Predicts Major A/NZ Critical Infrastructure Cybersecurity Uplift in 2024

Nozomi Networks Predicts Major A/NZ Critical Infrastructure Cybersecurity Uplift in 2024

Experts in Australia and New Zealand predict critical infrastructure owners will enhance operational technology security as legislative changes take shape, but skills shortages and visibility over networks remain key issues.
Australian Government Launches Comprehensive Cybersecurity Strategy to Protect National Economy

Australian Government Launches Comprehensive Cybersecurity Strategy to Protect National Economy

The Australian government has recently unveiled a new cybersecurity strategy designed to bolster the nation's cyber capabilities and protect the economy and its citizens from cyber threats. The policy, led by Minister Clare O'Neil, seeks to make Australian entities harder targets, and to enable faster recovery from cyber attacks. The government aims ...
Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...
Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...
Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.
The Unspoken Voice – CFOs Perspective On Security

The Unspoken Voice – CFOs Perspective On Security

The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...
Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...
Can Being “Compliant” Ever Top Being “Secure”?

Can Being “Compliant” Ever Top Being “Secure”?

My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
No results found.

In The News

Pax8 Names Marianne Wolf as Chief Ethics and Compliance Officer

Pax8 Names Marianne Wolf as Chief Ethics and Compliance Officer

SYDNEY, AU (February 12, 2025) – Pax8, the leading cloud commerce marketplace, announced the appointment of Marianne Wolf as its Chief Ethics and Compliance Officer. In this role, Wolf is responsible for leading the global ethics and compliance program, which includes overseeing cross-functional internal teams responsible for managing the company’s ...
Data Security And Quality Challenges Slow Liquidity Ambitions As Australian Companies’ AI Plans Progress: Boomi Report

Data Security And Quality Challenges Slow Liquidity Ambitions As Australian Companies’ AI Plans Progress: Boomi Report

Sydney, Australia — February 12, 2025 — Boomi™, the intelligent integration and automation leader, has unveiled the Australian findings of its Data Liquidity Index Study, conducted by Hanover Research. The survey found strong data integration capabilities within Australian organisations, but identified gaps in liquidity as companies battle challenges ...
Tenable February 2025 Patch Tuesday Comment

Tenable February 2025 Patch Tuesday Comment

Microsoft patched 55 CVEs in its February 2025 Patch Tuesday release, with three rated critical and 52 rated as important. Our counts omitted one vulnerability reported by HackerOne. Remote code execution (RCE) vulnerabilities accounted for 38.2% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at ...
Two Thirds of Australian Teens Experienced Online Risk Last Year, According to New Research From Microsoft

Two Thirds of Australian Teens Experienced Online Risk Last Year, According to New Research From Microsoft

64 percent of Australian teens experienced a risk online last year including cyberbullying, misinformation and disinformation, and threats of violence, according to Microsoft’s annual Global Online Safety Survey, released today.   The ninth iteration of Microsoft’s annual report, launched today on Safer Internet Day, reveals insights into how teens ...
Unlocking AI’s Full Potential: EXL’s “AI in Action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Unlocking AI’s Full Potential: EXL’s “AI in Action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

The event will provide attendees with actionable insights, hands-on demonstrations, and expert discussions to scale AI across the enterprise, bridge strategy with execution, and drive measurable business outcomes.
BeyondTrust Releases AI-powered True Privilege Graph to Expose How Attackers Exploit Hidden Paths to Privilege

BeyondTrust Releases AI-powered True Privilege Graph to Expose How Attackers Exploit Hidden Paths to Privilege

Revolutionary technology redefines Identity Security by revealing previously undetectable Paths to Privilege attackers attempt to leverage Prioritised remediations enhance security across endpoints, servers, Cloud and SaaS environments, reducing alert fatigue and enabling organisations to strengthen their defenses before attacks occur
Wild Tech Appoints Dan Whittle to Prepare Businesses for AI With Managed Services Expansion

Wild Tech Appoints Dan Whittle to Prepare Businesses for AI With Managed Services Expansion

Wild Tech has today announced the appointment of Dan Whittle as General Manager, Managed Services, marking a major milestone in the company's strategic trajectory. This initiative underscores Wild Tech's commitment to providing cutting-edge, technology solutions that enables the enterprise AI ready businesses of the future. Whittle joins Wild Tech ...
Fortinet Delivers Unmatched Security And Efficient Network Performance For The Distributed Enterprise With New Next-Gen Firewalls

Fortinet Delivers Unmatched Security And Efficient Network Performance For The Distributed Enterprise With New Next-Gen Firewalls

New FortiGate G series next-gen firewalls empower customers to strengthen threat protection and future-proof IT infrastructure 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This