The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Lack of IT Skills Greatest Data Security Challenge Australian Enterprises Face – Rubrik Zero Labs
Rubrik, the Zero Trust Data Security™ Company, today announced the Australian findings from its inaugural State of Data Security report, commissioned by Rubrik and conducted by Wakefield Research. Among the key findings regarding the most pressing challenge Australian cybersecurity leaders face in securing their organisation’s data was “insufficient ...

Progress Survey Reveals Roadblocks to DevSecOps Success in Australia, Shares Factors Driving DevSecOps Evolution for Next Two Years
60% of Australian respondents across 500+-employee organisations admit that they don’t fully understand how security fits into DevSecOps.

Mandiant releases cyber security forecast for 2023
Mandiant’s Cyber Security Forecast 2023 has provided an overview of the cyber security landscape in 2022, and offered forecasts for likely trends in 2023.

A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.

For The Sake Of Its Cybersecurity, Australia Must Come Together
The Pandemic Has Exacerbated Existing Security Problems
As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responses also had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...

Tackling Australia’s Evolving Threat Landscape – Zscaler
The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud
The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...

Business cyber risks and the humble home network
Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...
In The News
SentinelOne® and Aon Collaborate to Enhance Strategic Cyber Services for Insureds
Aon utilises SentinelOne Singularity™ platform to help profile risk for underwriting and provide more visibility into insurability drivers to better manage and mitigate risk
Progress Releases New AI-Driven Web Application Security Capabilities, Reducing False Positive Alerts
Provider of AI-powered infrastructure software Progress (Nasdaq: PRGS) today released new and powerful enhancements to help organisations protect their web applications against increasingly sophisticated cyberattacks, using AI-driven capabilities.
Web applications present attractive targets for malicious actors seeking to exploit vulnerabilities and ...
Global Organisations Boost Growth With Oracle Cloud VMware Solution
Ahold Delhaize, Hitachi Construction Machinery, Lemtrans, and Mazda Motors Logistics Europe N.V. move their business-critical VMware environments to Oracle Cloud VMware Solution. Latest OCI Compute with AMD, Intel, and NVIDIA processors give Oracle Cloud VMware Solution customers greater scale, performance, and address new use cases like virtual ...
Fortinet Named a Challenger In the 2024 Gartner® Magic Quadrant™ for Single-Vendor SASE
Fortinet continues to deliver strategic innovations in Unified Secure Access Service Edge (SASE) with accelerated global customer adoption John Maddison, chief marketing officer, Fortinet, said, “Fortinet Unified SASE embodies our longstanding commitment to converging networking and security to deliver integrated solutions to our customers. Like most ...
New Relic Launches the First Fully-Integrated, AI-Driven Digital Experience Monitoring Solution
Integrated DEM solution gives businesses end-to-end visibility and insights to deliver enriched user experiences across all digital channels.
New Relic DEM makes it easy for businesses to quickly identify and resolve user friction points across mobile, web, and AI-powered applications
ElectroNeek Joins the Pax8 Marketplace to Drive Automation for Partners and Their Customers
BRISBANE, AUSTRALIA. (July 10, 2024) – Pax8, the leading cloud commerce marketplace, today announced that ElectroNeek, a groundbreaking automation technology provider, has joined the Pax8 Marketplace. With ElectroNeek's innovative platform, Pax8 partners can access powerful automation tools to transform their business processes, driving efficiency for ...
NetApp Expands Intelligent Data Infrastructure Capabilities to Power Strategic Cloud Workloads
New capabilities empower customers to run data-intensive workloads like GenAI and VMware environments more easily
VAST Data Achieves High-Performance Storage Solution Certification for NVIDIA Partner Network Cloud Partners
VAST Data, today announced that the VAST Data Platform has been certified as a high-performance storage solution for NVIDIA Partner Network cloud partners. This certification underscores VAST’s position as a leading data platform provider for AI cloud infrastructure, and further strengthens VAST’s collaboration with NVIDIA in building out ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..