The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Accenture State of Cyber Resilience 2023 report reveals key traits of “cyber transformers,” who make cybersecurity the cornerstone of their business transformation efforts
CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

91% of Australian respondents experienced at least one ransom attack
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.  Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.  This event was hosted ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you from becoming a victim. High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. In the following article, we will showcase a range of real-world phishing ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

We already know that phishing is a significant threat to businesses and individuals. Anti-phishing tips, such as “always hover over the link in an email before clicking” or “be wary of emails with poor grammar”, are meant to help us avoid being tricked by phishing emails. These tips have been circulating on the internet for over a decade, but sadly, ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
No results found.

In The News

Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia

Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia

Honeywell today announced its Integrated Controls and Safety System (ICSS) will be designed and implemented in Iluka Resources’ (Iluka) Eneabba rare earths refinery in Western Australia to help improve production efficiency and create a safer environment for its workers. Through a strategic partnership between the Australian Government and Iluka, the ...
Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider. This strategic implementation will modernise and integrate business ...
Tenable Research in Verizon DBIR: Additional Research Analysis

Tenable Research in Verizon DBIR: Additional Research Analysis

Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited ...
New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into the evolving threat landscape of ransomware attacks. With cyber threats becoming more sophisticated and frequent, the report underlines the need for organisations to prioritise ...
Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

“The Armis Vulnerability Intelligence Database is a critical, accessible resource built by the security community, for the security community. It translates vulnerability data into real-world impact so that businesses can adapt quickly and make more informed decisions to manage cyber threats.”
CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

Companies team to empower organisations to securely leverage AI agents
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

ConfusedComposer Exploits Hidden Cloud Service Dependencies
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This