The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns
Jo Stewart-Rattray: “It is paramount that organisations understand what is expected of them in order to devise an effective privacy policy and implement accordingly. Then will they be able to realise the benefits of embedding privacy practices in digital transformation from the outset, including customer loyalty, reputational and financial performance.”
People Are An Essential Element In Your Cybersecurity Incident Response Plan
Introduction
While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception.
Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative
The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk. However, many ...

Ransomware Attacks: No Sector is Safe
Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast
Introduction
In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...

Australia Sanctions Russian Hacker
Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
AI for Cybersecurity: Use With Caution
This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain
We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
No results found.
In The News
CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery
Companies team to empower organisations to securely leverage AI agents
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights
Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform
ConfusedComposer Exploits Hidden Cloud Service Dependencies
CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions
This collaboration underscores CIOSO Global's mission to discover and champion innovative approaches to cybersecurity in an ever-evolving threat landscape, which includes AI and quantum computing-driven cyberattacks.
Akamai Research: AI-Powered Applications Drove 51 Billion Web Attacks in Asia Pacific and Japan, Up 73% Year-Over-Year
Australia was the most targeted country by web and API attacks in APJ
Rubrik Appoints Kavitha Mariappan as Chief Transformation Officer
Sydney, April 24, 2025 — Building on a milestone year for the company, Rubrik (NYSE: RBRK) today announced the appointment of Kavitha Mariappan as its Chief Transformation Officer (CTxO). This newly created role is aimed at deepening executive engagement and accelerating cyber resilience outcomes for global enterprises and public sector ...
Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising
Cloud application monitoring and security platform Datadog today released its new report, the State of DevSecOps 2025, which found that only a fraction of critical vulnerabilities are truly worth prioritising.
To better understand the severity of a vulnerability, Datadog developed a prioritisation algorithm that factored in runtime context to its ...
Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR
Bitdefender has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), the industry’s first endpoint security solution to dynamically tailor hardening for each user—ensuring that security configurations align precisely with user-intended privileges and behaviours and continuously adapt ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..