The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cyberbullying Surge Prompts Parental Talks

Cyberbullying Surge Prompts Parental Talks

With cyberbullying incidents on the rise, Australian parents are urged to have crucial conversations with their children about online safety. The number of reported cases has jumped from 1,700 to, 383 in just one year, with children aged 12 to 15 being the most affected. Acting eSafety Commissioner Kathryn King emphasises the importance of open ...
The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data

The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data

Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control.
Smarttech247, Cybersecurity Trends in 2024

Smarttech247, Cybersecurity Trends in 2024

As we enter 2024, Raluca Saceanu, CEO of Smarttech247, a London-listed company specialising in AI-enhanced cybersecurity services with a focus on automated managed detection and response, offers insights into the evolving threat landscape and the four key global cybersecurity themes for the year ahead. AI's Evolution and Dominance In 2023, ...
Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

SMS services remain a critical part of telecommunications; they don't require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in their never-ending campaigns. And if you think that the new RCS messaging standard will ...
Data Privacy Week – Taking Control of Data

Data Privacy Week – Taking Control of Data

Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data have the power and the responsibility to take control of data and use it for the common good.
Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Jo Stewart-Rattray: “It is paramount that organisations understand what is expected of them in order to devise an effective privacy policy and implement accordingly. Then will they be able to realise the benefits of embedding privacy practices in digital transformation from the outset, including customer loyalty, reputational and financial performance.”
People Are An Essential Element In Your Cybersecurity Incident Response Plan

People Are An Essential Element In Your Cybersecurity Incident Response Plan

Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...
Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk.  However, many ...
No results found.

In The News

Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve

IT teams and support desks replacing non-compliant remote access tools are turning to BeyondTrust to help them meet modern security and compliance standards. BeyondTrust Remote Support is compliance-ready, with built-in capabilities to help IT teams align with FIPS, CJIS, FedRamp, and other key security and compliance mandates without added complexity ...
Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most

Tenable®, the exposure management company, today announced the next evolution of its industry-leading Tenable Vulnerability Priority Rating (VPR) to sharpen precision and focus on risks that pose the greatest threat. Powered by generative AI, enriched threat intelligence and context-aware scoring, Tenable VPR enables organisations to quickly understand ...
Oracle Helps Customers Boost Supply Chain Efficiency with New Advanced Inventory Management Solution

Oracle Helps Customers Boost Supply Chain Efficiency with New Advanced Inventory Management Solution

New capabilities within Oracle Cloud SCM help organisations streamline warehouse operations, simplify inventory transactions, and accelerate order fulfilment
FICO Survey: 7 in 10 APAC bank leaders say scams and mule accounts are now the dominant fraud concern

FICO Survey: 7 in 10 APAC bank leaders say scams and mule accounts are now the dominant fraud concern

Industry poll reveals social media as key scam channel, while data silos hinder bank response
Ericsson powers Telstra’s 5G evolution with Automated Carrier Aggregation on commercial network

Ericsson powers Telstra’s 5G evolution with Automated Carrier Aggregation on commercial network

Ericsson (NASDAQ: ERIC) has marked an industry milestone by deploying Automated Carrier Aggregation in more than 50 of Telstra’s live commercial 5G Advanced sites across North Sydney, making Telstra the first operator to use this feature in a live commercial network environment. The innovative software capability, part of Ericsson 5G Advanced ...
NEW REPORT: 2025 Global Practitioner Survey

NEW REPORT: 2025 Global Practitioner Survey

While AI adoption is accelerating and delivering substantial returns, a new report from Workiva uncovered alarming gaps in data quality, AI governance, and role-specific training for Australian companies. The report summarises the results of an independent global survey of 2,300 finance, sustainability, audit, and risk professionals responsible for ...
Tenable Comment for System Administrator Appreciation Day

Tenable Comment for System Administrator Appreciation Day

System Administrator Appreciation Day on 25 July 2025 is a timely reminder of the critical and often invisible role sysadmins play in keeping the digital world running smoothly. While their work might not always make headlines, it forms the basis for every aspect of modern business operations, from system uptime and network stability to data security ...
Motorola Solutions Debuts ‘AI Nutrition Labels,’ to Boost Transparency in Public Safety Technology

Motorola Solutions Debuts ‘AI Nutrition Labels,’ to Boost Transparency in Public Safety Technology

Company commits to transparently propelling the power of AI in protecting people, property and places
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This