The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a response back to the source IP address, it is sent to the fake source IP address ...
AI Skills Could Boost Australia Workers’ Salaries by More Than 29% and Accelerate Career Growth as AI Adoption Ramps up, Finds New Research
Hiring AI-skilled talent is a priority for nearly two out of three employers in Australia but 75% struggle to find the AI talent they need, highlighting a looming AI skills gap in the country.

Protecting the Digital Realm Knows No Gender
Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more appealing to women, many of whom are making significant contributions to development. It’s ...

Reputational Risk, Ransomware and the ‘Operational Resilience’ Imperative
When organisations are hit by ransomware attacks and business operations go down, there’s often a rush to blame. Who’s responsible? Who should resign? Less often is the question: What can we learn from it? As cyber incidents become more a matter of inevitability, it’s increasingly critical that businesses also invest in their operational resilience – ...

AI-generated Code: The Fourth Component of Software
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In parallel, software security professionals are closely watching the practical impact of ...
Using Annual Loss Expectancy (ALE) for Cybersecurity Tech Investment Planning and Building a Business Case
Using Annual Loss Expectancy (ALE) to build a business case for purchasing cybersecurity solutions

Transforming Tomorrow: How Women in Science, Technology, Engineering, and Mathematics (STEM) Are Shaping a Better Future
Across STEM women remain underrepresented despite the wide-ranging benefits we know they bring to the field, especially in areas like Cyber Security. So, how do we close this gap? In this article John Penn, Senior Security Propositions Manager and Lucy Mentoring Program Lead at BT, discusses how mentorship is a powerful tool to support more women in ...
Building Resilience in Australia’s Critical Infrastructure With AI-Enhanced Surveillance
In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the functioning of a society, so it is vital that those providing these services can maintain business continuity.
Australia, with its vast and diverse landscape, faces unique challenges in ...
No results found.
In the News
CrowdStrike and NVIDIA Redefine Cybersecurity With Always-On AI Agents Protecting the Nation’s Digital Infrastructure
Always-on agents built with CrowdStrike Charlotte AI AgentWorks and integrated with NVIDIA Nemotron and NVIDIA NIM microservices will enable real-time threat detection and response across cloud, data center, and edge environments
Palo Alto Networks and Cyberlite Partner to Launch AI Safety in the Classroom Toolkit, a Landmark Resource to Equip Students With Critical Generative AI Skills
New modular resource empowers non-experts, educators, parents, and instructors to teach students critical thinking for safe and ethical AI use
DigiCert Launches Inaugural RADAR Brief
New Cyber Intelligence Reveals ‘Internet Tsunami’ Attacks and Rising Automation in Global Attacks
NetApp Celebrates 25 Years of Excellence and Innovation in Australia
Introduces new innovations for AI, cyber resilience and cloud transformation
76 Percent of Organizations Struggle to Match the Speed of AI-Powered Attacks, Finds CrowdStrike State of Ransomware Survey
Ransomware readiness lags as adversaries use AI across the attack chain to accelerate intrusion, encryption, and extortion
Two Tasmanian Local Councils Strengthen Cyber Resilience Through Partnership With Excite Cyber
“You can buy technology, but without people, it won’t work. Excite Cyber helped us embed security as part of our culture. That’s something we couldn’t have achieved alone without their training and guidance.”
Iron Mountain Becomes Official Partner of McLaren Racing
SYDNEY, AU -- Iron Mountain, a global leader in information management services, and McLaren Racing have announced the company as an Official Partner of the McLaren Formula 1 Team.
Iron Mountain will play a key role in McLaren Racing’s digital heritage transformation journey. Its AI-enabled digital platform will help to activate McLaren's legendary ...
New Infoblox Research Links One of Asia’s Largest iGaming Providers to Criminal Underworld
Infoblox Threat Intel (ITI), together with the United Nations Office on Drugs and Crime (UNODC), has linked BBIN aka Baoying Group, one of Asia’s largest iGaming providers, through interlocking corporate ownership structures and affiliations to cyber-enabled fraud, illegal online gambling, and organised crime in Southeast Asia. At the heart of ITI’s ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
