The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Future of Work Predictions 2024

Future of Work Predictions 2024

With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year. Prediction: AI Will Be Your Best Work Buddy One of the most exciting ideas for workplace productivity is the deployment of AI assistants that help employees become — and continue to be — efficient and effective. For example, ...
A Human Centric Tech Revolution in 2024

A Human Centric Tech Revolution in 2024

With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence. Work Needs To Revolve Around Humans, Not The Other Way Around Productivity ...
Businesses Need To Rewrite Their Identity Security Playbook For 2024

Businesses Need To Rewrite Their Identity Security Playbook For 2024

With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...

Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel

In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President & Chief Product Officer, shed light on the company's significant announcements and the profound advancements in the field of cybersecurity. Patel's insights underscore the pivotal role of artificial intelligence (AI) in revolutionising security, carving a ...
A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For ...
Battling Cyber Scams: Traditional Algorithms Won’t Cut it

Battling Cyber Scams: Traditional Algorithms Won’t Cut it

Australians have experienced a surge in scams, with losses amounting to a staggering $3.1 billion in the past year alone. From a cybersecurity perspective, traditional anti-fraud analytics won’t stem the rising tide of scams. FICO's Vaile Mexted shares five key considerations for the finance sector as it faces an urgent imperative to fortify defences ...
Building Bridges: Developing Cybersecurity Skills And Elevating Talent

Building Bridges: Developing Cybersecurity Skills And Elevating Talent

The cybersecurity sector is at a crossroads, grappling with what can only be described as an existential crisis. The gap in cybersecurity skills has grown to alarming proportions with Australia boasting a shortage of 25,000 to 30,000 cybersecurity professionals in 2022. The escalating complexity of cyber threats, showcased by the 95% increase in ...
Legal Privilege – For Cyber Incidents

Legal Privilege – For Cyber Incidents

A class action lawsuit has been filed against the telecommunications company Optus by former and current customers whose personal information was exposed in a data breach. The lawsuit, representing millions of customers, alleges that Optus failed to protect customer information, breached privacy and telecommunication laws, and did not take proper steps ...
No results found.

In The News

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

Sydney, Australia – April 2, 2025 – OpenText™, today introduced the availability of Project Titanium X, now ready with Cloud Editions 25.2 (CE 25.2), the culmination of two years of strategic engineering powering the next generation of Business Clouds, Business AI and Business Technology. Cloud Editions 25.2 brings together a comprehensive set of ...
Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Proactive Multi-Agent Experience Uplevels the SOC, Enables Security Leaders, Analysts, and Investigators to Increase Productivity and Impact
JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust in Newly Created Software 
Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable, the cloud exposure management company, has identified a privilege escalation vulnerability in Google Cloud Run called ImageRunner. The vulnerability could have allowed attackers to bypass permissions, gain unauthorised access to container images and potentially expose sensitive data. Cloud Run, Google’s serverless container platform, uses a ...
World Cloud Security Day – CyberArk’s Insights On Effective Cloud Identity Security

World Cloud Security Day – CyberArk’s Insights On Effective Cloud Identity Security

“World Cloud Security Day is a timely reminder of the critical need for robust cloud identity security. Cloud-native organisations operating in complex, multi-cloud environments are navigating a rapidly evolving landscape and an explosion of identities – both human and machine - that traditional security models struggle to manage. The lack of ...
Motorola Solutions Delivers Resilient Security for Critical Infrastructure with New Pelco Portfolio

Motorola Solutions Delivers Resilient Security for Critical Infrastructure with New Pelco Portfolio

Motorola Solutions has announced the new Pelco, an innovative portfolio of artificial-intelligence-powered devices that are purpose-built for enterprises operating in some of the most challenging environments, like oil and gas and ports. Backed by the company’s deep engineering expertise and significant investments in research and development, Pelco’s ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This