The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Business cyber risks and the humble home network
Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...

Personal Liability in Cyber – What Can We Expect?
The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability.

Absolute Advances New Era of Resilient Zero Trust
New 451 Research Report Underscores Need for Resiliency in Zero Trust, Achieved via Integrated Endpoint Security, Secure Access, Network Visibility, and Management

New White Paper from ISACA Delves into Risk Tolerance
The first step to addressing the myriad types of risk that need to be managed in an organisation is understanding risk appetite and tolerance. ISACA has released two new resources that offer guidance in both areas: the Using Risk Tolerance to Support Enterprise Strategy white paper and Risk Scenarios Toolkit.

Nozomi Networks-Sponsored SANS Survey Finds Security Defences are Getting Stronger as Cyber Threats to OT Environments Remain High
Nozomi Networks Inc., the leader in operational technology (OT) and IoT security, today announced the SANS 2022 OT/ICS Cybersecurity Report finds industrial control systems (ICS) cybersecurity threats remain high as adversaries set their sights on control system components. In response, organisations have significantly matured their security postures ...

New Genetec research shows cybersecurity remains a top concern for physical security professionals worldwide
As cybersecurity awareness month becomes a focus of discussion in October, new research conducted by Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shows that cybersecurity remains a top concern for physical security professionals going into 2023.

We’re Still Terrible at Passwords, Confirms New Research
Poor password management making it easy for cyber-attackers to access corporate systems

Australia’s leaders confident with cyber disclosure ability, yet hesitant to sharing publicly – PwC Digital Trust Insights Survey
In an age of growing transparency, with consumers increasingly concerned about how their data is stored and used, domestic results indicate that Australia is lagging behind its global counterparts, according to local data released today from PwC’s 2023 Global Digital Trust Insights Survey.
No results found.
In The News
Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks
Privileged Task Automation revolutionises the way organisations manage the execution of tasks that require privileged access
New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour
The findings demonstrate a strong correlation between full-stack observability and reduced downtime, fewer interruptions, and lower annual outage costs—reinforcing the critical role observability plays in maximising operational efficiencies and business performance.
Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software
Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source ...
AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season
With sales beginning as early as October and extending through late December, Imperva warns that the holiday shopping season represents a critical time for online retailers. AI-driven attacks originate from AI tools like ChatGPT, Claude, and Gemini, alongside specialised bots that are designed to scrape websites for LLM (Large Language Model) training data.
Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services
Trustwave, a global leader in cybersecurity and managed security services, has announced an expanded partnership with Dicker Data, Australia’s premier IT distributor, which has long been a Trustwave solutions distributor. Dicker Data will now offer the entire portfolio of Trustwave’s cutting-edge cybersecurity services to its resellers as part of this ...
Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organisations Worldwide
Sophos today announced a definitive agreement for Sophos to acquire Secureworks. The all-cash transaction is valued at approximately $859 million. Sophos is backed by Thoma Bravo, a leading software investment firm.
Sophos’ experience and reputation as a leading provider of managed security services and end-to-end security products, combined with ...
Camelot Secure Wins APT Solution Provider of the Year, Leading the Charge in Proactive Cybersecurity Defense
Camelot’s Advanced Persistent Threat (APT) Hunt Service offers organizations a means to proactively identify potential threats through advanced technological innovations before they can inflict harm. This approach represents a significant departure from traditional cybersecurity practices, shifting towards a more offensive, proactive strategy in ...
BeyondTrust Releases Cybersecurity Predictions for 2025 and Beyond
BeyondTrust experts predict a paradigm shift in security strategies as identity risks and quantum threats take centre stage
Top cybersecurity threats include the evolution of the AI2, quantum computing, and cyber insurance
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..