The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Proofpoint: 78% of Australia’s Banks Are Not Proactively Blocking Fraudulent Emails

Proofpoint: 78% of Australia’s Banks Are Not Proactively Blocking Fraudulent Emails

Proofpoint, Inc., a leading cybersecurity and compliance company, today released new research identifying that almost 4 out of 5 Australian-owned authorised deposit-taking institutions and foreign subsidiary banks are lagging behind on basic cybersecurity measures, subjecting customers, staff and stakeholders to a higher risk of email-based ...
Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

“The Library of Babel” is an imaginary library containing countless rooms and books with every possible combination of letters and numbers.
Decoy Dog is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Decoy Dog is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Infoblox Inc., the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection, today published a second threat report with critical updates on “Decoy Dog,” the remote access trojan (RAT) toolkit they discovered and disclosed in April 2023.
Ways to Reduce the Risk of Burnout in your IT Security Team

Ways to Reduce the Risk of Burnout in your IT Security Team

With organisations experiencing a constantly growing wave of cyberattacks, many IT security teams are feeling the pressure. Stressful work environments and long hours are resulting in staff feeling overwhelmed and burnt out.
How securing remote management tools provides better protection for businesses

How securing remote management tools provides better protection for businesses

The latest data reveals that Australian small businesses lost almost $13.7 million to scams in 2022, an increase of 95 per cent compared to 2021, according to the Australian Competition and Consumer Commission (ACCC).
Forescout Uncovers The 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Forescout Uncovers The 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, Forescout released the first Enterprise of Things Security Report, followed in 2022 with the Riskiest Connected Devices in Enterprise Networks report.
Five Ways to Ensure Compliance when Managing Customer Data

Five Ways to Ensure Compliance when Managing Customer Data

As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.
Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
No results found.

In The News

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2

Sydney, Australia – April 2, 2025 – OpenText™, today introduced the availability of Project Titanium X, now ready with Cloud Editions 25.2 (CE 25.2), the culmination of two years of strategic engineering powering the next generation of Business Clouds, Business AI and Business Technology. Cloud Editions 25.2 brings together a comprehensive set of ...
Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity

Proactive Multi-Agent Experience Uplevels the SOC, Enables Security Leaders, Analysts, and Investigators to Increase Productivity and Impact
JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain

The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust in Newly Created Software 
Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies

Tenable, the cloud exposure management company, has identified a privilege escalation vulnerability in Google Cloud Run called ImageRunner. The vulnerability could have allowed attackers to bypass permissions, gain unauthorised access to container images and potentially expose sensitive data. Cloud Run, Google’s serverless container platform, uses a ...
World Cloud Security Day – CyberArk’s Insights On Effective Cloud Identity Security

World Cloud Security Day – CyberArk’s Insights On Effective Cloud Identity Security

“World Cloud Security Day is a timely reminder of the critical need for robust cloud identity security. Cloud-native organisations operating in complex, multi-cloud environments are navigating a rapidly evolving landscape and an explosion of identities – both human and machine - that traditional security models struggle to manage. The lack of ...
Motorola Solutions Delivers Resilient Security for Critical Infrastructure with New Pelco Portfolio

Motorola Solutions Delivers Resilient Security for Critical Infrastructure with New Pelco Portfolio

Motorola Solutions has announced the new Pelco, an innovative portfolio of artificial-intelligence-powered devices that are purpose-built for enterprises operating in some of the most challenging environments, like oil and gas and ports. Backed by the company’s deep engineering expertise and significant investments in research and development, Pelco’s ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This