The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Three-quarters of Australian organisations concerned about threats to 5G network and security of data in motion
Thales today released the local findings of its annual Data Threat Report 2023 which shows that new techniques such as double extortion as well as the expansion of 5G networks are two drivers increasing cyber and data threats for Aussie organisations.
Recorded Future’s Monthly CVE Report Records 2,200 Cyber Vulnerabilities for April, Microsoft Still Topping the List
Australian organisations should pay attention to 15 high risk vulnerabilities across Microsoft, Apple and Google. Some of the vulnerabilities in Apple and Microsoft are being used by the Nokoya ransomware group and likely nation-state actors.

The Microsoft Azure service that had 80 vulnerabilities in one year
As the range of cloud services on offer grows, one might expect a corresponding increase in vulnerabilities - but for Microsoft, one cloud service experienced a disproportionately high number compared to others, writes James Maude, Lead Cyber Security Researcher, BeyondTrust.

Fortinet survey finds 78 per cent of organisations felt prepared for ransomware attacks, yet half still fell victim
John Maddison, executive vice president of products and chief marketing officer, Fortinet, said, “According to the Fortinet research released, though three out of four organisations detected ransomware attacks early, half still fell victim to them. These results demonstrate the urgency to move beyond simple detection to real-time response. However, ...

New Relic’s 2023 State of Java Ecosystem Report: Java Still Dominant
New Relic (NYSE: NEWR), the all-in-one observability platform for every engineer, released its second annual State of the Java Ecosystem Report to provide context and insights into the current state of the Java ecosystem. Following the recent release of Java 17, the report finds that the adoption rate for the latest long-term support (LTS) release has ...

Report Reveals the Need for the Convergence of Observability and Security as Rising Complexity of Cloud-Native Development Exposes Australian Organisations to Heightened Security Risks
Dynatrace (NYSE: DT), the leader in unified observability and security, has announced the findings of an independent global survey of 1,300 chief information security officers (CISOs), including 100 respondents from Australia, in large organisations. The research reveals that CISOs find it increasingly difficult to keep their software secure as their ...

New Research Underscores Security and Compliance Challenges Remain Across Distributed Workforces
Report reveals OS fragmentation, endpoint and network complexity creating false sense of security for enterprises

Asset Deployment and the Changing Face of Mining
As an industry, mining has always been slow to adopt new ideas due to the enormous upfront investment in capital. It is clear, however, that new approaches are required to transform operations because of the pressure on margins and the need to extract raw materials more efficiently and cheaper than competitors. The mining sector is experiencing a ...
No results found.
In The News
NinjaOne Announces New Capabilities to Improve Digital Employee Experience and Productivity
NinjaOne has announced expanded capabilities to help IT teams improve users’ experiences with their devices. The new use cases include self-service workflows, end-user dashboards, and user-centric automations to make organisations and their employees more efficient and productive.
IT leaders are increasingly focusing not only on improving how they ...
CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program
New incentives, tools, training and resources make it easier for partners to consolidate cybersecurity on the Falcon platform, driving larger deals and superior customer outcomes
ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention
Heavy workloads and long hours cited as the top stressors for IT professionals, according to new ISACA research
CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers
CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, ...
Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain
Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds
Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta
All finalists are members of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their security products and services with Microsoft’s security technology.
SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations
SecurityBridge integrates seamlessly with enterprise SIEM and ITSM solutions, offering built-in SAP security monitoring rules customized to fit organizational needs.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..