The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Partnerships play a vital role in meeting customer demands and driving success for organisations. In a recent episode of the KBKast podcast, host Karissa Breen sat down with Raj Sharma, from Palo Alto Networks, to discuss the importance of strategic partnerships and the changing dynamics of the reseller ecosystem. From the rise of direct ...
The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most cyber secure nation by 2030. However, according to Apple, Australia is one of the top four countries for cyber-attacks - behind the US, the UK and Canada. With the government playing an increasingly proactive, and prominent role in ...
Robust Physical Security Includes Strong Data Privacy 

Robust Physical Security Includes Strong Data Privacy 

Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue technologies, towards modern digital infrastructure. At the same time, governments and citizens have become increasingly concerned about privacy implications.
Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Introduction Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity industry. In this article, we will delve into the dynamics of M&A within the cybersecurity sector, exploring both successful and unsuccessful instances. Additionally, we will provide insights for start-up and mid-market businesses ...
The New Ransomware Threat Targeting Global Institutions

The New Ransomware Threat Targeting Global Institutions

The British Library falls victim to Rhysida, a ransomware group employing a "double extortion" tactic. With global ambitions and sophisticated techniques, Rhysida poses a significant threat to institutions worldwide. The rise of ransomware payments and cybercriminal sophistication is cause for concern. Stay tuned for more on Rhysida in our upcoming ...
Future of Work Predictions 2024

Future of Work Predictions 2024

With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year. Prediction: AI Will Be Your Best Work Buddy One of the most exciting ideas for workplace productivity is the deployment of AI assistants that help employees become — and continue to be — efficient and effective. For example, ...
A Human Centric Tech Revolution in 2024

A Human Centric Tech Revolution in 2024

With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence. Work Needs To Revolve Around Humans, Not The Other Way Around Productivity ...
Businesses Need To Rewrite Their Identity Security Playbook For 2024

Businesses Need To Rewrite Their Identity Security Playbook For 2024

With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...
No results found.

In The News

Tenable Comment: MITRE CVE Program Funding Set To Expire

Tenable Comment: MITRE CVE Program Funding Set To Expire

MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be catalogued. Please find below a comment from Satnam Narang, sr. staff research engineer at Tenable and a bog here from ...
DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert

New data from Radware’s Hacktivism Unveiled Q1 2025 report underscores a sharp escalation in politically motivated cyberattacks, particularly Distributed Denial-of-Service (DDoS) campaigns. The United States emerged as the most frequently targeted nation, experiencing 558 attacks—13.5% of all incidents globally—outpacing Ukraine (400) and Israel (340). ...
Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ

Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in Asia Pacific and Japan
Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond

Tenable®, the exposure management company, today announced that its Board of Directors has unanimously appointed Steve Vintz and Mark Thurmond as Co-Chief Executive Officers on a permanent basis. Following an extensive search process that considered both internal and external candidates, the Board concluded that Vintz and Thurmond are best positioned ...
12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities

Total vulnerabilities reached an all-time high of 1,360 in 2024, an 11% increase from the previous record of 1,292 in 2022 Elevation of Privilege (EoP) and Remote Code Execution (RCE)—primary goals of any threat actor looking to exploit a system—continue to dominate the vulnerability categories year-over-year
New Research Reveals Australian Businesses Are Experiencing a Rise In Fraud

New Research Reveals Australian Businesses Are Experiencing a Rise In Fraud

61% of Australian respondents have reported increases in the most common types of fraud such as identity theft, account creation fraud and digital document forgeries.
Fuse Partners With Check Point Software to Deploy First Advanced Blockchain Firewall for Real-Time Threat Prevention

Fuse Partners With Check Point Software to Deploy First Advanced Blockchain Firewall for Real-Time Threat Prevention

Partnership introduces first-of-its-kind, AI-powered threat prevention layer for blockchains—securing smart contracts, wallets in real time
Datadog Named a Leader in AIOps by Independent Research Firm

Datadog Named a Leader in AIOps by Independent Research Firm

Datadog received the highest score possible in multiple criteria, including innovation, log management, data governance and lineage, cloud and infrastructure, APM, and more
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This