The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Singapore’s Minister Mrs Josephine Teo Discusses Digital Transformation and Women’s Leadership With Oracle’s CEO Safra Catz
Recently at the Oracle CloudWorld Tour held at the Shangri-La in Singapore, Oracle's CEO Safra Catz, Singapore's Minister for Communications and Information and Second Minister for Home Affairs, Mrs Josephine Teo, highlighted the critical role of digital transformation in Singapore's development and shared insights on empowering women in leadership ...

Tenable Comment: CVE-2022-38028: GooseEgg EoP Exploit
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit

The Conversations Boards Should Have About Cybersecurity
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...

Advancing Security and Resilience: Insights From AWS Summit in Sydney
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia
AI - an Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1
From the late 1940s through the 1970s, the concept of software development has its’ origins in ...

‘Captivity Clouds’ – A Trap for Modern Day Security Leaders
Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily ...

Prioritise Foundational Cloud Security Before Leveraging Generative AI
An article around how to prioritise foundational cloud security before leveraging Generative AI.
No results found.
In the News
Quorum Cyber Is a Proud Participant in the Microsoft Sentinel Partner Ecosystem
Quorum Cyber is working with Microsoft product teams to shape Sentinel product development, including validation of new scenarios, feedback on product operations, and API extensibility - while also extending Sentinel’s capabilities as part of the partner ecosystem. By creating solutions such as connectors, analytics, playbooks, hunting queries, Jupyter ...
Fastly Recognised as a Gartner® Peer Insights™ Customer’s Choice for Seventh Consecutive Year, Trusted by Customers for Cloud Web Application and API Protection
Sydney, 3 October 2025 - Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced that it was named a 2025 Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection (WAAP). Fastly received overall high ratings and is the only vendor to earn this recognition for seven consecutive years.
The ...
New Infoblox Research Uncovers DNS TXT Abuse in Stealth Malware Campaign Infecting Thousands of Sites
New Infoblox Threat Intel research reveals that a long-running threat actor compromising websites, coined as “Detour Dog,” has evolved from scam redirects to deliver information stealing malware. This allows compromised sites to fetch and relay malicious execution output without any visible cues to the user, all using the domain name system (DNS) for ...
Genetec Continues to Expand Its Share of the Global Access Control Software Market, According to Latest Omdia Report
Company records strong organic market share gain worldwide, reflecting 20 years of access control innovation and rapid adoption of ACaaS solutions
Sophos Launches Advisory Services to Deliver Proactive Cybersecurity Resilience
Sophos today announced the launch of Sophos Advisory Services, a suite of security testing services designed to identify gaps in organisations’ security programs. These offerings – External Penetration Testing, Internal Penetration Testing, Wireless Network Penetration Testing, and Web Application Security Assessment – help fortify an organisation’s ...
Exabeam Delivers First Configurable Peer Benchmarking for CISO Decision-Making
New capabilities in the Exabeam Nova Advisor Agent and Outcomes Navigator operationalise benchmarking for proactive security operations
Ping Identity Survey Reveals Australian Consumer Trust Plummeting as Security Concerns Soar
With only 20% confident in spotting scams, Australians demand stronger AI security and regulation
C-Suite’s Rush to AI Blinds Leadership to Critical Security Failures, Leaving Organisations Exposed
With 34% of organisations suffering an AI-related breach, new Tenable report shows leadership is misjudging risk by focusing on reactive metrics instead of preventable threats
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
