The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

It’s been 12 Months since the Optus Breach.  Now What?

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked

The perimeters of technological defences are shifting, and—in some cases—disappearing altogether.
IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages

IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages

SolarWinds, the leading provider in software management solutions and observability serving 96% of the Fortune 500, has released its 10th annual IT Trends Report, detailing the impact observability solutions have on navigating challenges from digital transformation, moving to the cloud and remote work—both within the IT department and beyond.
Automating evidence collection will improve your cloud incident response process

Automating evidence collection will improve your cloud incident response process

A primary concern of any security team is having the ability to respond to security events efficiently and in a timely manner, well before they are at risk of escalating. The lack of automation coupled with alert fatigue often leads to overlooked risk, where seemingly low-severity detections may actually be connected to something far more malicious. To ...
How Water Utilities can Boost Their Cybersecurity Resilience

How Water Utilities can Boost Their Cybersecurity Resilience

Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses.
Best-Practice Ways to Prevent Phishing Attacks

Best-Practice Ways to Prevent Phishing Attacks

They’ve been a focus of attention for IT security teams for years, yet the threats posed by phishing campaigns are showing no sign of easing. Phishing remains a popular tactic for cybercriminals for one simple reason: it works. If a staff member can be tricked into clicking on a link or opening an email attachment containing malicious code, the result ...
Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals

Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes.
No results found.

In The News

Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

“The Armis Vulnerability Intelligence Database is a critical, accessible resource built by the security community, for the security community. It translates vulnerability data into real-world impact so that businesses can adapt quickly and make more informed decisions to manage cyber threats.”
CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

Companies team to empower organisations to securely leverage AI agents
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

ConfusedComposer Exploits Hidden Cloud Service Dependencies
CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

This collaboration underscores CIOSO Global's mission to discover and champion innovative approaches to cybersecurity in an ever-evolving threat landscape, which includes AI and quantum computing-driven cyberattacks.
Akamai Research: AI-Powered Applications Drove 51 Billion Web Attacks in Asia Pacific and Japan, Up 73% Year-Over-Year

Akamai Research: AI-Powered Applications Drove 51 Billion Web Attacks in Asia Pacific and Japan, Up 73% Year-Over-Year

Australia was the most targeted country by web and API attacks in APJ
Rubrik Appoints Kavitha Mariappan as Chief Transformation Officer

Rubrik Appoints Kavitha Mariappan as Chief Transformation Officer

Sydney, April 24, 2025 — Building on a milestone year for the company, Rubrik (NYSE: RBRK) today announced the appointment of Kavitha Mariappan as its Chief Transformation Officer (CTxO). This newly created role is aimed at deepening executive engagement and accelerating cyber resilience outcomes for global enterprises and public sector ...
Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Cloud application monitoring and security platform Datadog today released its new report, the State of DevSecOps 2025, which found that only a fraction of critical vulnerabilities are truly worth prioritising. To better understand the severity of a vulnerability, Datadog developed a prioritisation algorithm that factored in runtime context to its ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This