The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

โ€˜Cloud engagedโ€™ CEOs are key to Australiaโ€™s multi-cloud maturity

โ€˜Cloud engagedโ€™ CEOs are key to Australiaโ€™s multi-cloud maturity

New global research from VMware reveals CEOโ€™s link to cloud maturity and related business benefits among companies in Australia and across the region.
Lack of IT Skills Greatest Data Security Challenge Australian Enterprises Face โ€“ Rubrik Zero Labs

Lack of IT Skills Greatest Data Security Challenge Australian Enterprises Face โ€“ Rubrik Zero Labs

Rubrik, the Zero Trust Data Securityโ„ข Company, today announced the Australian findings from its inaugural State of Data Security report, commissioned by Rubrik and conducted by Wakefield Research. Among the key findings regarding the most pressing challenge Australian cybersecurity leaders face in securing their organisationโ€™s data was โ€œinsufficient ...
Progress Survey Reveals Roadblocks to DevSecOps Success in Australia, Shares Factors Driving DevSecOps Evolution for Next Two Years

Progress Survey Reveals Roadblocks to DevSecOps Success in Australia, Shares Factors Driving DevSecOps Evolution for Next Two Years

60% of Australian respondents across 500+-employee organisations admit that they donโ€™t fully understand how security fits into DevSecOps.
Mandiant releases cyber security forecast for 2023

Mandiant releases cyber security forecast for 2023

Mandiantโ€™s Cyber Security Forecast 2023 has provided an overview of the cyber security landscape in 2022, and offered forecasts for likely trends in 2023.
A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.
For The Sake Of Its Cybersecurity, Australia Must Come Together

For The Sake Of Its Cybersecurity, Australia Must Come Together

The Pandemic Has Exacerbated Existing Security Problems As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responsesย alsoย had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...
Tackling Australiaโ€™s Evolving Threat Landscape โ€“ Zscaler

Tackling Australiaโ€™s Evolving Threat Landscape โ€“ Zscaler

The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...
The Air Gap is Dead – Itโ€™s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – Itโ€™s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...

In The News

Australian Businesses Are Betting On AI In The Face of Customer Churn

Australian Businesses Are Betting On AI In The Face of Customer Churn

Ninety-seven percent of Australian businesses are looking to AI for enhanced customer experience despite 95% still harbouring fears over the technology, Genesys research reveals.
Report: 99% Of Australian Organisations Had Two or More Identity-Related Breaches in the Past Year

Report: 99% Of Australian Organisations Had Two or More Identity-Related Breaches in the Past Year

Australia ranks second most breached nation surveyed for occurrences of credentials theft, 3rd party and supply chain breaches, as digital transformation shared as most likely cause of breach, ahead of geo-political/state actors 99% of Australian organisations expect negative impact from using AI powered tools on cybersecurity in the next year ...
Joe Levy Appointed CEO of Sophos

Joe Levy Appointed CEO of Sophos

Sophos hasย today announced that Joe Levy is now chief executive officer (CEO) of the company. Levy has been acting CEO since Feb. 15. To drive a critical role in the execution of his strategy to shape the future of Sophos, Levy has named Jim Dildine Sophosโ€™ new chief financial officer (CFO) and a member of his senior management team. Levy is a ...
Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Tenable Research has discovered a critical memory corruption vulnerability in Fluent Bitโ€™s built-in HTTP server that could potentially result in denial of service (DoS), information leakage, or remote code execution (RCE). The issue was reported to the projectโ€™s maintainers on April 30, 2024. Fixes were committed to the projectโ€™s main branch on May 15 ...
SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP

SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP

New Dashboard Provides a Customized, At-A-Glance View of the Entire SAP Security Landscape
Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks

Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks

SYDNEY, Australia, 16 May 2024ย โ€“ Palo Alto Networks, the global cybersecurity leader, announced today that Australian telecommunications provider, Superloop, has achieved Palo Alto Networksโ€™ MSSP accreditation for Prisma SASE. This accreditation underscores Superloopโ€™s proven expertise in delivering SD-WAN and Cloud Security Services. To obtain this ...
Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident

Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident

"It's important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and mitigate operational risks.ย 
Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques

Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques

Kinsing malware has previously been seen targeting Linux-based cloud infrastructures, now hitting Apache Tomcat servers

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This