The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition

Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition

Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.
How Visible Is My Profile on the Internet?

How Visible Is My Profile on the Internet?

There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What is profile visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...
Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud

Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud

Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.
Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...
Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Overseas entities present a serious cyber risk of ransomware and state-sponsored threats
My Facebook is hacked – What do I do?

My Facebook is hacked – What do I do?

I must admit that it is quite a stressful experience and for some, it may even turn out to be a harrowing one. A basic question that you may have is:   Why would someone be interested in my Facebook account? =/ There could be various reasons why someone would want to sneak into your Facebook account. Tarnish your image - Someone wanting to ...
LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

LogRhythm Announces First Half 2023 Success And Expansions With Product Enhancements That Improve Visibility In The Threats That Matter Most and Reinforce The Company’s Commitment To Being A Trusted Security Partner

LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, has announced its 20-year milestone with a renewed commitment to delivering innovative solutions.
No results found.

In The News

Rethinking IT Sustainability To Achieve Outcomes That Matter To the Planet and the Bottom Line

Rethinking IT Sustainability To Achieve Outcomes That Matter To the Planet and the Bottom Line

Sustainability has become a critical business priority, connecting environmental responsibility with financial performance. For many companies, the focus is shifting from simply upgrading technology to maximising value across the entire device lifecycle. As businesses rethink how they manage their IT infrastructure, embedding sustainability into daily ...
BeyondTrust Names Industry Veteran Sean Malone as Chief Information Security Officer

BeyondTrust Names Industry Veteran Sean Malone as Chief Information Security Officer

Experienced security leader joins BeyondTrust to drive innovation and strengthen identity security leadership Sean Malone brings deep expertise in offensive security, cyber risk, and threat management to CISO role
Palo Alto Networks Announces Intent to Acquire Protect AI, a Game-Changing Security for AI Company

Palo Alto Networks Announces Intent to Acquire Protect AI, a Game-Changing Security for AI Company

The acquisition will enable secure pursuit of AI innovation with confidence by helping customers discover, manage, and protect against AI-specific security risks—securing AI end to end from development to runtime.
Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools

Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools

29 April 2025: Logicalis, the leading global technology service provider, has revealed that chief information officers (CIOs) are struggling to derive value from security investments amid an expanding threat landscape according to its annual CIO Report. Logicalis surveyed 1,000 global IT leaders, including more than 300 from Asia Pacific (APAC), ...
BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™

BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™

Complimentary new assessment--powered by Identity Security Insights--provides actionable recommendations to secure against vulnerabilities and help organisations tackle identity threats New assessment quickly reveals hidden Paths to Privilege, employing AI-based detection, and provides an initial set of prioritised findings to help guide security decisions
Palo Alto Networks Cortex XSIAM Delivers Industry’s First AI-Driven SecOps Platform to Span Proactive and Reactive Security

Palo Alto Networks Cortex XSIAM Delivers Industry’s First AI-Driven SecOps Platform to Span Proactive and Reactive Security

Evolves industry-leading capabilities with AI-driven Cortex Exposure management and Advanced Email Security
CrowdStrike Delivers Industry-First Managed Threat Hunting Across Third-Party Data

CrowdStrike Delivers Industry-First Managed Threat Hunting Across Third-Party Data

Falcon Adversary OverWatch now hunts across third-party data in Falcon Next-Gen SIEM, extending expert-driven detection across every attack surface to stop stealthy adversaries
ColorTokens Highlighted Among Top Providers of Microsegmentation Technology by Industry Experts, Paving the Way for Continued Success in 2025

ColorTokens Highlighted Among Top Providers of Microsegmentation Technology by Industry Experts, Paving the Way for Continued Success in 2025

ColorTokens Announces Key Achievements and Industry Accolades in 2025; Named “Visionary Vendor” by EMA, Recognized as Leader by GigaOm, and Awarded Four Globee Cybersecurity Awards.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This