The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Fortinet survey finds 78 per cent of organisations felt prepared for ransomware attacks, yet half still fell victim
John Maddison, executive vice president of products and chief marketing officer, Fortinet, said, “According to the Fortinet research released, though three out of four organisations detected ransomware attacks early, half still fell victim to them. These results demonstrate the urgency to move beyond simple detection to real-time response. However, ...

New Relic’s 2023 State of Java Ecosystem Report: Java Still Dominant
New Relic (NYSE: NEWR), the all-in-one observability platform for every engineer, released its second annual State of the Java Ecosystem Report to provide context and insights into the current state of the Java ecosystem. Following the recent release of Java 17, the report finds that the adoption rate for the latest long-term support (LTS) release has ...

Report Reveals the Need for the Convergence of Observability and Security as Rising Complexity of Cloud-Native Development Exposes Australian Organisations to Heightened Security Risks
Dynatrace (NYSE: DT), the leader in unified observability and security, has announced the findings of an independent global survey of 1,300 chief information security officers (CISOs), including 100 respondents from Australia, in large organisations. The research reveals that CISOs find it increasingly difficult to keep their software secure as their ...

New Research Underscores Security and Compliance Challenges Remain Across Distributed Workforces
Report reveals OS fragmentation, endpoint and network complexity creating false sense of security for enterprises

Asset Deployment and the Changing Face of Mining
As an industry, mining has always been slow to adopt new ideas due to the enormous upfront investment in capital. It is clear, however, that new approaches are required to transform operations because of the pressure on margins and the need to extract raw materials more efficiently and cheaper than competitors. The mining sector is experiencing a ...

New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats
Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.

Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted
Annual Phishing Report Highlights New and Evolving Phishing Campaigns Resulting from the Rise of AI Platforms, like ChatGPT, Urges Organisations to Adopt a Zero Trust Architecture

How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands
Amidst an environment of ever-increasing digital threats, growing numbers of organisations are turning to cyber insurance as a means of protecting against the fallout from attacks.
No results found.
In The News
Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires
Collaboration enables customers to easily switch to Delinea’s advanced CIEM solution, safeguarding human and machine identities in public, multi-cloud environments
Datadog Unveils Plans for Data Centre in Australia
Datadog today announced plans for a new data centre to be located in Australia. The data centre instance, which will be built on AWS, will be Datadog’s first in Australia and adds to existing locations in North America, Asia, Europe and AWS GovCloud.
The Australian data centre will store and process data locally, creating sovereign capacity to help ...
Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days
Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies
Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
OpenText Announces Availability of Titanium X Powered By the Latest Cloud Editions 25.2
Sydney, Australia – April 2, 2025 – OpenText™, today introduced the availability of Project Titanium X, now ready with Cloud Editions 25.2 (CE 25.2), the culmination of two years of strategic engineering powering the next generation of Business Clouds, Business AI and Business Technology.
Cloud Editions 25.2 brings together a comprehensive set of ...
Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity
Proactive Multi-Agent Experience Uplevels the SOC, Enables Security Leaders, Analysts, and Investigators to Increase Productivity and Impact
JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain
The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust in Newly Created Software
Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies
Tenable, the cloud exposure management company, has identified a privilege escalation vulnerability in Google Cloud Run called ImageRunner. The vulnerability could have allowed attackers to bypass permissions, gain unauthorised access to container images and potentially expose sensitive data.
Cloud Run, Google’s serverless container platform, uses a ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..