The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unveiling API Vulnerabilities: The Crucial Role of Plain English Clarity

Unveiling API Vulnerabilities: The Crucial Role of Plain English Clarity

Plain English is increasingly important to securing APIs against coding errors and business logic abuse.
Weaving Sustainability into the DNA of How Companies Operate

Weaving Sustainability into the DNA of How Companies Operate

82% of executives want to see an improvement in the sustainability of their workplaces, but the big question is how do businesses embed sustainability in their organisations in a lasting way that meets the expectations of executives and stakeholders? BT's Global Head of Sustainability, Sarwar Khan, discusses the three key focus areas companies need to ...
How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency, and success, it simultaneously empowers malicious threat actors to evolve and make more ...
Enhancing And Democratising DevSecOps With Generative AI And ClickOps

Enhancing And Democratising DevSecOps With Generative AI And ClickOps

While still nascent, generative AI and no-code ClickOps solutions show immense promise for augmenting and spreading DevSecOps capabilities more widely in 2024, enabling enhanced delivery, and scalability across critical systems.
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
No results found.

In The News

Trend Micro Warns of Thousands of Exposed AI Servers

Trend Micro Warns of Thousands of Exposed AI Servers

Latest research reveals mounting infrastructure-level risks from diverse components
Nozomi Networks Labs Report Finds Australia the fourth most targeted country

Nozomi Networks Labs Report Finds Australia the fourth most targeted country

The latest Nozomi Networks Labs OT & IoT Security Report released today finds Australia the fourth most targeted country. The report assesses the operational technology (OT) and Internet of Things (IoT) threat landscape to provide insights into how industrial organisations and critical infrastructure are being targeted by cyberattacks. Leveraging a ...
Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform

Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform

Tenable One now connects more of the security stack than any other exposure management platform, empowering customers with unmatched context into their cyber exposure
FieldEx Leverages Datadog to Enhance Resilience and Operational Efficiency

FieldEx Leverages Datadog to Enhance Resilience and Operational Efficiency

Malaysian startup scaled operations and streamlined issue detection and alerting using Datadog’s comprehensive cloud observability platform
Rapid7 Launches Incident Command: AI-Native SIEM Empowers Analysts to Act with Speed and Precision from Risk to Response

Rapid7 Launches Incident Command: AI-Native SIEM Empowers Analysts to Act with Speed and Precision from Risk to Response

Rapid7 has launched Incident Command, a next-gen SIEM built on its Command Platform to transform how security teams detect, investigate, and respond to threats. Powered by SOC-tested Agentic AI, it unifies threat detection, exposure management, automation, and curated threat intelligence in a single interface.
Australian IT Teams Spend A Quarter of Their Week on Outages, Yet Report Strong Resilience

Australian IT Teams Spend A Quarter of Their Week on Outages, Yet Report Strong Resilience

New SolarWinds Report Reveals a Gap A Perception Gap, As Many Local IT Teams Struggle With Processes, Staffing, and Technology Readiness 
Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface

Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface

Active Patching, a fully automated patching and remediation solution integrated into Rapid7’s Exposure Command solution. Powered by Automox, it empowers security and IT teams to proactively mitigate risk across vulnerable assets.
Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks

New report explores the tactics, techniques, and procedures attackers use and the fallout for organisations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This