The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Has Critical Infrastructure Become A Prime Target For Cyber Attacks?
From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly relying on an internet connection to help them deliver their services.
Critical ...

Recap on the ACCC 2023 Report: Industry Round Up
Recently the ACCC released their report from the National Anti-Scam Centre on scams activity in 2023, which highlighted a decrease in financial losses despite an increase in scam reports. The total combined losses reported in 2023 were $2.74 billion, showing a 13% decrease compared to the previous year. Efforts from Government, private sector, and law ...

How Monitoring Can Enhance An Organisation’s Security Protection
Network monitoring is important in maintaining optimal IT infrastructure performance and security. Such software plays a role in monitoring various network parameters, ensuring security through features like overload protection, automatic log out, and prevention of malicious code execution. The critical role of network monitoring in safeguarding ...

Where Australian Organisations Go Wrong With Cyber Risk Quantification
The promise of getting directors, executives and cyber teams all talking the same language can be challenging to accomplish and bring unintended consequences.

Singapore’s Minister Mrs Josephine Teo Discusses Digital Transformation and Women’s Leadership with Oracle’s CEO Safra Catz
Recently at the Oracle CloudWorld Tour held at the Shangri-La in Singapore, Oracle's CEO Safra Catz, Singapore's Minister for Communications and Information and Second Minister for Home Affairs, Mrs Josephine Teo, highlighted the critical role of digital transformation in Singapore's development and shared insights on empowering women in leadership ...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit

The Conversations Boards Should Have About Cybersecurity
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...

Advancing Security and Resilience: Insights from AWS Summit in Sydney
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
No results found.
In The News
CrowdStrike Delivers a New Era of Operational Threat Intelligence, Personalized to Each Customer Environment
Latest Falcon Adversary Intelligence release embeds real-time, customized insights into analyst workflows, accelerating detection, investigation, and response

KBI.Media Expands into the United States, with Karissa Breen Leading its Global Cybersecurity Storytelling
SYDNEY, AUSTRALIA – August 6, 2025 – KBI.Media, the modern media company at the coalface of cybersecurity journalism, is proud to announce its official expansion into the United States. This move marks a new chapter for the company as it sets out to bring its unique brand of cyber coverage to the world's largest technology and security market, upwards ...
Armis Rapidly Surpasses US$300M ARR as Demand For Cyber Exposure Management and Cyber-Physical Systems Security Soars
Global organisations drive demand for Armis Centrix™, continuing to adopt more products to enable them to see, protect and manage the entire attack surface.
BeyondTrust Accelerates Identity Security Innovation and Research Momentum with Launch of Phantom Labs
Las Vegas, NV – August 4, 2025 – BeyondTrust, the global leader in identity security protecting Paths to Privilege™, today announced the formal launch of its dedicated cybersecurity research team, BeyondTrust Phantom Labs™. The launch of Phantom Labs represents a strategic milestone in BeyondTrust’s ongoing mission to advance identity security ...
Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management
New approach introduces a marketplace of Cyber Risk AI Agents that autonomously drive every step of Cyber Risk Operations—dramatically improving risk posture and reducing operational costs
BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent
New data from Identity Security Risk Assessments reveals critical blind spots in non-human identity posture
BeyondTrust’s latest solution brings secrets into full view, just as Agentic AI spins up at scale
2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale
DPRK-nexus adversaries infiltrate 320+ companies using GenAI accelerated attacks; threat actors exploit AI agents, exposing autonomous systems as the next enterprise attack surface
Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative
Joint Collaboration Enables Real-Time Intelligence Sharing and Mutual Anti-Tamper Protections to Accelerate Ransomware Detection and Response
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
