The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Mandiant releases cyber security forecast for 2023
Mandiant’s Cyber Security Forecast 2023 has provided an overview of the cyber security landscape in 2022, and offered forecasts for likely trends in 2023.

A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.

For The Sake Of Its Cybersecurity, Australia Must Come Together
The Pandemic Has Exacerbated Existing Security Problems
As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responses also had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...

Tackling Australia’s Evolving Threat Landscape – Zscaler
The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud
The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...

Business cyber risks and the humble home network
Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...

Personal Liability in Cyber – What Can We Expect?
The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability.

Absolute Advances New Era of Resilient Zero Trust
New 451 Research Report Underscores Need for Resiliency in Zero Trust, Achieved via Integrated Endpoint Security, Secure Access, Network Visibility, and Management
No results found.
In The News
Elastic Expedites SecOps Tasks with LangChain
The combined technologies bring AI-driven security innovations to SOC teams
Veeam Ranked #1 In The 2024 Gartner® Market Share Analysis For Enterprise Backup And Recovery Software Report
Veeam jumps to lead position worldwide as the need for data resilience accelerates
New Fastly Threat Research Reveals 91% of Cyberattacks Targeted Multiple Organisations Using Mass Scanning to Uncover and Exploit Vulnerabilities
Additional findings show unwanted bots, short-lived IP addresses and out-of-band domains used by adversaries to commit cybercrime and avoid detection
Interactive Announces The Appointment Of Alex Coates As CEO
Melbourne, Australia – 21 August 2024: Interactive, one of Australia’s leading IT service providers, today announced the appointment of Alex Coates as Chief Executive Officer, effective from 28th January 2025.
Alex will lead the executive leadership team and drive Interactive’s growth strategy across its Cloud, Cyber and Systems business units, ...
Cloudian and Lenovo Ship AI Data Lake Platform with Breakthrough Performance and Efficiency Powered by AMD
Cloudian and Lenovo today announced the general availability of a new Cloudian HyperStore AI data lake platform that delivers breakthrough levels of performance and power efficiency. Built on Lenovo ThinkSystem SR635 V3 all-flash servers with AMD EPYC™ 9454P processors, the new solution demonstrated performance of 28.7 GB/s reads and 18.4 GB/s writes ...
Tenable Empowers Global Fashion Group to Elevate Cloud Security and Streamline Cyber Risk Communication
Tenable One consolidates security tools into unified view, improving visibility and context of attack surface
Trustwave Appointed to Department of Defence ICTPA Panel
Canberra, Australia – 21 August, 2024 – Trustwave, a global leader in managed security services, proudly announced its appointment to the Information Communications Technology Provider Arrangement (ICTPA) panel. This appointment marks a significant milestone for Trustwave Asia Pacific, as it opens new avenues for the company to directly provide ...
2024 CrowdStrike Threat Hunting Report: Nation-States Exploit Legitimate Credentials to Pose as Insiders
North Korean insider threat targets U.S. technology companies; cloud and cross-domain attacks, credential and RMM tool abuse persists
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..