The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Monitoring Can Enhance An Organisation’s Security Protection
Network monitoring is important in maintaining optimal IT infrastructure performance and security. Such software plays a role in monitoring various network parameters, ensuring security through features like overload protection, automatic log out, and prevention of malicious code execution. The critical role of network monitoring in safeguarding ...

Where Australian Organisations Go Wrong With Cyber Risk Quantification
The promise of getting directors, executives and cyber teams all talking the same language can be challenging to accomplish and bring unintended consequences.

Singapore’s Minister Mrs Josephine Teo Discusses Digital Transformation and Women’s Leadership with Oracle’s CEO Safra Catz
Recently at the Oracle CloudWorld Tour held at the Shangri-La in Singapore, Oracle's CEO Safra Catz, Singapore's Minister for Communications and Information and Second Minister for Home Affairs, Mrs Josephine Teo, highlighted the critical role of digital transformation in Singapore's development and shared insights on empowering women in leadership ...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit

The Conversations Boards Should Have About Cybersecurity
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...

Advancing Security and Resilience: Insights from AWS Summit in Sydney
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia
AI - An Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1
From the late 1940s through the 1970s, the concept of software development has its’ origins in ...
No results found.
In The News
JFrog Unveils AppTrust: “DevGovOps” Solution to Redefine Software Release Governance
Platform-native, secure, release management solution delivers evidence-based insights for software supply chain security, compliance, and integrity
Kyndryl Survey Reveals That Mainframe Modernisation Projects Deliver 2-3X Return on Investment
Respondents expect AI will drive billions in cost savings and increased revenues. The mainframe powers AI innovation across hybrid IT environments.
KnowBe4 Defines a Holistic Approach to Human Risk Management
KnowBe’s new HRM framework guides organisations to transform employees into an active layer of defence through data-driven insights, cultural understanding and targeted interventions
Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan
SYDNEY – September 10 2025 – Cohesity, a leader in AI-powered data security, today announced the appointment of Greg Statton as Chief Technology Officer for the Asia Pacific and Japan (APJ) region. In this newly created role, Statton will lead technology strategy and innovation initiatives across APJ, supporting Cohesity’s mission to deliver ...
Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers
Launch of new 12-week video series on AI/LLM security empowers developers to safely adopt AI coding and mitigate emerging security risks
Exabeam Extends Proven Insider Threat Detection to AI Agents with Google Cloud
Exabeam unlocks visibility into AI agent behaviour to detect intent, drift, and compromise where legacy tools fail
Tenable Patch Tuesday Commentary
This month’s Patch Tuesday release highlights an emerging trend. For the third time this year, Microsoft patched more elevation of privilege vulnerabilities than remote code execution flaws. Nearly 50% (47.5%) of all bugs this month are privilege escalation vulnerabilities.
One of the more interesting vulnerabilities patched this month is ...
Cisco and Splunk elevate the SOC with Agentic AI
Cisco today introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR). Delivered within Splunk Enterprise Security 8.2 – a market-leading SIEM solution – these ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
