The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

What I’ve Learnt as an Entrepreneur
A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.

What I’ve Learnt as an Entrepreneur
A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.

Australian Public: How to add 2FA
Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...

Privacy Has a Business Model Problem
Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...

Virus & Malware Scanning Object Storage in OCI
If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem.
I just clicked on this link, and my computer is doing something weird. I think my PC has a virus, what do I do?
When it’s just a single computer, the answer is simple, ...

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime
The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime
The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...

Darktrace – Media Roundtable | Event Report
I was recently invited to a Roundtable Media Event held by Darktrace to unpack the new era of cyber security threats. Held on Thursday 16th June, it was led by Tony Jarvis, Director of Enterprise Security and Dave Palmer, Chief Product Officer.
The following is a synopsis of the event and a deeper dive into what was covered.
Most Significant ...
In The News
LogRhythm’s Machine Data Intelligence Fabric Empowers AI-Ready Organisations to Enter the Modern Era with Confidence
BROOMFIELD, Colo.—July 1, 2024—LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced its ninth consecutive quarterly release. In the AI-ready world, LogRhythm empowers security teams with the highest integrity data in the security industry to enhance the output of ...
Motorola Solutions Acquires Noggin, a Global Provider of Critical Event Management Software
Motorola Solutions has acquired Noggin, a global provider of cloud-based business continuity planning, operational resilience and critical event management (CEM) software. The company is headquartered in Sydney, Australia, with a global footprint of customers.
Noggin’s software helps enterprises and critical infrastructure anticipate, prepare for ...
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 Agrees to Acquire Cyber Asset Attack Surface Management Company, Noetic Cyber, to Give Customers More Comprehensive Visibility of Their Attack Surface
Rapid7 extends its security operations platform to unlock more accessible and accurate asset inventory for better security outcomes
ManageEngine Study Reveals Insufficient Visibility Into Business Processes and Infrastructure Automation in Australian SMEs
ManageEngine, today unveiled the findings of its comprehensive Digital Intensity in Australia Study, conducted by technology advisory firm, Ecosystm. As market competition increases, small to midsize enterprises (SMEs) in Australia are shifting to modern technology infrastructure to maintain their competitive edge. However, this surge in digital ...
Elastic Introduces Playground to Accelerate RAG Development with Elasticsearch
A new interface enables developers to iterate and build RAG applications for A/B testing LLMs, tuning prompts and chunking data
AUSCERT Launches New Maturity Assessment Service To Help Organisations Improve Cybersecurity Posture
AUSCERT General Manager, Dr Ivano Bongiovanni, says the new Maturity Assessment Service will enable organisations of all sizes to take proactive steps to enhance their cybersecurity posture and mitigate cybersecurity risks.
Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16%
Zebra Study: 25% of APAC Manufacturers Achieve Real-Time Visibility into Manufacturing Production, Surpassing Global Average of 16%
Additional findings of high expected AI adoption growth suggests data utilisation is key to increasing visibility
Camelot Secure CEO Stanford Oliver Wins 2024 Fortress Cybersecurity Leadership Award
Camelot Secure CEO Stan Oliver was named a winner in the Leadership category by the prestigious 2024 Fortress Cybersecurity Awards. Stan’s submission rose to the top of the judges’ evaluations in part as a result of his pioneering leadership, innovative cybersecurity solutions, dedication to educational advancements, and ability to quickly overcome ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..