The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

91% of Australian organisations find the execution of essential security operation tasks challenging, Sophos survey finds

91% of Australian organisations find the execution of essential security operation tasks challenging, Sophos survey finds

Among these challenges, 71% struggle with Identifying the root causes behind an Incident, leaving them vulnerable to further malicious activity
Wesfarmers OneDigital and AWS sign agreement to transform the shopping experience for Aussies

Wesfarmers OneDigital and AWS sign agreement to transform the shopping experience for Aussies

Wesfarmers OneDigital today announced a five-year agreement with Amazon Web Services (AWS) to support the businessโ€™s developing data and digital platform to deliver the best value and services for its customers. The new agreement means AWS will be the strategic cloud provider across the Wesfarmers Group.
Australia’s Information Media and Telecoms Industry Under Spotlight as 50 Million Australian Records Lost to Cybercriminals

Australia’s Information Media and Telecoms Industry Under Spotlight as 50 Million Australian Records Lost to Cybercriminals

Flashpointโ€™s risk landscape report shows percentage of stolen Australian credentials in 2022 increases by 99%
Consumers threaten to abandon businesses that pollute by hoarding unnecessary data

Consumers threaten to abandon businesses that pollute by hoarding unnecessary data

Nearly half of Australian consumers said they would stop buying from companies wilfully causing environmental damage by failing to control how much unneeded data they are storing.
Palo Alto Networks Global State of Cloud-Native Security Survey Reveals 93% of Australian Organisations Cannot Detect, Contain and Resolve Cyberthreats Within an Hour

Palo Alto Networks Global State of Cloud-Native Security Survey Reveals 93% of Australian Organisations Cannot Detect, Contain and Resolve Cyberthreats Within an Hour

Third annual report identifies top security gaps and challenges for organisations operating in the cloud
Survey: 92% of Global Organisations Indicate Identity Security as Critical for a Robust Zero Trust Implementation

Survey: 92% of Global Organisations Indicate Identity Security as Critical for a Robust Zero Trust Implementation

CyberArk Introduces Peer-Based Framework for Evaluating and Maturing Identity Security Strategies
Investment in digital customer engagement drives 90% average revenue increase for Australian brands as data protection emerges as top priority

Investment in digital customer engagement drives 90% average revenue increase for Australian brands as data protection emerges as top priority

Twilioโ€™s fourth annual State of Customer Engagement Report reveals customer engagement investments increase brandsโ€™ resilience by boosting revenue and improving customer loyalty. Protecting data is top of mind for Australian brands and consumers as impact of continuing cybercrime ups the ante on privacy and security.
Why emergency phase planning isn’t enough for secure data management

Why emergency phase planning isn’t enough for secure data management

The federal government recently announced it will form a new agency,ย theย National Office of Cyber Security, which will be led by a new cyber co-ordinatorย to manage major incidents across government and to liaise with affected companies during the emergency phase. In the past few months, the industry has witnessed the dire need Australian businesses ...

In The News

2024 Qualys Midyear Threat Landscape Review

2024 Qualys Midyear Threat Landscape Review

According to the Qualys 2024 Midyear Threat Landscape Review: The number of reported Common Vulnerabilities and Exposures (CVEs) rose by 30% in the last year to 22,254. These numbers reflect rising software complexity and the broader use of technology, necessitating advanced and dynamic vulnerability management strategies to mitigate evolving ...
Rapid7 Ransomware Radar Report Charts Ransomware Group Activity and Methodologies for Fresh Insights

Rapid7 Ransomware Radar Report Charts Ransomware Group Activity and Methodologies for Fresh Insights

New research from Rapid7 analyses more than 70 active ransomware groups, 21 of which were new in 2024. The Ransomware Radar Report provides a fresh perspective on the globalย ransomware threat by analysing, comparing, and contrasting attacker activity and techniques over an 18-month period ending June 30, 2024.
Infoblox Unveils New Ecosystem Program to Boost Enterprise Security and Enhance Network Visibility with Certified Integrations

Infoblox Unveils New Ecosystem Program to Boost Enterprise Security and Enhance Network Visibility with Certified Integrations

Infoblox today unveiled its new Infoblox Ecosystem Program. Key to the program is a self-service portal that features certified out-of-the-box integrations for leading technology providers. Infoblox-certified integrations undergo rigorous testing, optimisation, validation, and ongoing updates to ensure seamless compatibility, and are backed by support ...
Absolute Security Showcases Next Generation Cyber Resilience

Absolute Security Showcases Next Generation Cyber Resilience

Absolute Security Showcases Next Generation Cyber Resilience, which provides a new remote rehydration capability that automates recovery and remediation for ransomware, BSOD, and other disruptions
Armis Surpasses US$200M ARR, Doubling ARR in less than 18 months

Armis Surpasses US$200M ARR, Doubling ARR in less than 18 months

Rapid Growth and Unmatched Scale Cements Armisโ€™ Position as a Global Cybersecurity Leader, as it Continues Prep for IPO
Ransomware Groups Weaponise Stolen Data to Increase Pressure on Targets Who Refuse to Pay, Sophos Finds

Ransomware Groups Weaponise Stolen Data to Increase Pressure on Targets Who Refuse to Pay, Sophos Finds

Sophos today released a new dark web report, โ€œTurning the Screws: The Pressure Tactics of Ransomware Gangs,โ€ which details how cybercriminals are weaponising stolen data to increase pressure on targets who refuse to pay. This includes sharing the contact details or doxing the family members of targeted CEOs and business owners, as well as threatening ...
Popular OT/IoT Router Firmware Images Contain Outdated Software and Exploitable N-Day Vulnerabilities Affecting the Kernel

Popular OT/IoT Router Firmware Images Contain Outdated Software and Exploitable N-Day Vulnerabilities Affecting the Kernel

Forescout and Finite State today announced today the release of a new report, โ€œRough Around the Edges,โ€ that analyses the state of software supply chain in OT/IoT routers, which are essential for connecting critical devices across various environments to the internet. The research revealed that OT and IoT cellular routers, and others used in small ...
ColorTokens Lands & Expands In APAC Region with New Hires

ColorTokens Lands & Expands In APAC Region with New Hires

Microsegmentation company establishes strong presence in APAC with key appointments across ASEAN and ANZ, with growth and global commitment to breach readiness.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This