The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...

The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions
Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.

How Disjointed Identities have Become a Significant Security Threat
The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.

How the Security of Critical Infrastructure (SOCI) Act is strengthening Australia’s critical infrastructure cybersecurity posture
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity.

Don’t Be The Weakest Link In The Ongoing Battle Against Phishing Attacks
The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses reported for the year were $2.74 billion, a 13% decrease from 2022, the report ...

Exploring the Intersection of AI and Cybersecurity Ethics
The Recap
In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in the cybersecurity domain, providing valuable insights for both professionals and ...

The Importance of Undertaking Cyber Risk Quantification
This article looks at the process of cyber risk quantification.
Australia’s FSIs Can Lead The Way In Secure AI-augmented Software Development
The early successes seen with pair programming will amount to nothing if the code output is of poor quality or is insecure.
No results found.
In The News
NinjaOne Now Available for Purchase on the CrowdStrike Marketplace
CrowdStrike customers gain simplified access to NinjaOne to streamline IT and boost productivity
F5 to Acquire CalypsoAI to Bring Advanced AI Guardrails to Large Enterprises
CalypsoAI's adaptive AI inference security solutions will enable companies to deliver AI apps more securely
Widespread Failure in Cloud Security Fundamentals Leaves Organisations Exposed, New Tenable Data Shows
Despite years of warnings, organisations are failing to master the fundamentals of cloud security, creating significant cyber exposure gaps. As they overwhelmingly adopt complex cloud and hybrid environments, a critical failure to manage identity-based threats and bridge the internal expertise gap is among the risks, leaving them dangerously exposed to ...
Smartsheet Names Ravi Soin as Chief Information Security Officer
Seattle CIO of the Year Winner to lead IT and security to fuel market growth
Bitdefender Report: New APT Framework Targeting a Philippine Military Company
This report analyses a sophisticated cyber-attack targeting a military company based in the Philippines, which led to the discovery of a new and advanced malware toolset. Based on the target's strategic value and the geopolitical context of the South China Sea, the attackers' tactics, techniques, and procedures (TTPs) are consistent with those of ...
JFrog Launches AI Catalog to Secure and Govern AI Model Delivery
New AI Catalog Extends the JFrog Platform to Discover, Govern, and Deploy AI Models, including the Open-Source NVIDIA Nemotron Models, with Speed, Security, and Compliance
JFrog Extends its System of Record Solution, Empowering Application Delivery Governance with Evidence from World-Leading Companies
Unifying proof from GitHub, ServiceNow, Sonar, and more, JFrog AppTrust delivers a trusted single source of truth for faster, more reliable, compliant software releases
Kaseya Adds New Chief Revenue Officer and Chief Technology Officer
"We are at a pivotal moment in our industry," said Rania Succar, CEO, Kaseya. "Small and midsize businesses are modernising their technology stacks at a once-in-a-generation pace, and MSPs are their critical partners. Kaseya has the opportunity to be at the centre of this transformation- harnessing Al to automate, strengthen security, protect data and ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
