The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Weaving Sustainability into the DNA of How Companies Operate

Weaving Sustainability into the DNA of How Companies Operate

82% of executives want to see an improvement in the sustainability of their workplaces, but the big question is how do businesses embed sustainability in their organisations in a lasting way that meets the expectations of executives and stakeholders? BT's Global Head of Sustainability, Sarwar Khan, discusses the three key focus areas companies need to ...
How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency, and success, it simultaneously empowers malicious threat actors to evolve and make more ...
Enhancing And Democratising DevSecOps With Generative AI And ClickOps

Enhancing And Democratising DevSecOps With Generative AI And ClickOps

While still nascent, generative AI and no-code ClickOps solutions show immense promise for augmenting and spreading DevSecOps capabilities more widely in 2024, enabling enhanced delivery, and scalability across critical systems.
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
No results found.

In The News

Trend Micro and Google Cloud Deepen Collaboration to Advance AI-Driven Cybersecurity and Sovereign Cloud Solutions

Trend Micro and Google Cloud Deepen Collaboration to Advance AI-Driven Cybersecurity and Sovereign Cloud Solutions

Advancing proactive security across cloud environments and fighting online scams with AI
Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

IT teams and support desks replacing non-compliant remote access tools are turning to BeyondTrust to help them meet modern security and compliance standards. BeyondTrust Remote Support is compliance-ready, with built-in capabilities to help IT teams align with FIPS, CJIS, FedRamp, and other key security and compliance mandates without added complexity ...
Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable®, the exposure management company, today announced the next evolution of its industry-leading Tenable Vulnerability Priority Rating (VPR) to sharpen precision and focus on risks that pose the greatest threat. Powered by generative AI, enriched threat intelligence and context-aware scoring, Tenable VPR enables organisations to quickly understand ...
Oracle Helps Customers Boost Supply Chain Efficiency with New Advanced Inventory Management Solution

Oracle Helps Customers Boost Supply Chain Efficiency with New Advanced Inventory Management Solution

New capabilities within Oracle Cloud SCM help organisations streamline warehouse operations, simplify inventory transactions, and accelerate order fulfilment
FICO Survey: 7 in 10 APAC bank leaders say scams and mule accounts are now the dominant fraud concern

FICO Survey: 7 in 10 APAC bank leaders say scams and mule accounts are now the dominant fraud concern

Industry poll reveals social media as key scam channel, while data silos hinder bank response
Ericsson powers Telstra’s 5G evolution with Automated Carrier Aggregation on commercial network

Ericsson powers Telstra’s 5G evolution with Automated Carrier Aggregation on commercial network

Ericsson (NASDAQ: ERIC) has marked an industry milestone by deploying Automated Carrier Aggregation in more than 50 of Telstra’s live commercial 5G Advanced sites across North Sydney, making Telstra the first operator to use this feature in a live commercial network environment. The innovative software capability, part of Ericsson 5G Advanced ...
NEW REPORT: 2025 Global Practitioner Survey

NEW REPORT: 2025 Global Practitioner Survey

While AI adoption is accelerating and delivering substantial returns, a new report from Workiva uncovered alarming gaps in data quality, AI governance, and role-specific training for Australian companies. The report summarises the results of an independent global survey of 2,300 finance, sustainability, audit, and risk professionals responsible for ...
Tenable Comment for System Administrator Appreciation Day

Tenable Comment for System Administrator Appreciation Day

System Administrator Appreciation Day on 25 July 2025 is a timely reminder of the critical and often invisible role sysadmins play in keeping the digital world running smoothly. While their work might not always make headlines, it forms the basis for every aspect of modern business operations, from system uptime and network stability to data security ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This