The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Unspoken Voice – CFOs Perspective On Security
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...

Cybersecurity Implications of Cryptocurrency and Blockchain Technology
Introduction
This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...

Can Being “Compliant” Ever Top Being “Secure”?
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?

A Look Inside a Cybercriminal Execution Chain
During a cyber attack, the process of compromising a machine rarely involves a single step.

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024
With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.

Unlocking Opportunities: Australian Talent in the US Job Market
A Conversation with Amy Meyer, Founder from Aussie Recruit on Overcoming Challenges and Thriving in the US
Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity
In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances.
Small to medium sized players have been under particular pressure, according to accountancy firm Grant Thornton’s The State of Australian Manufacturing: ...

The Social Responsibility of Data Security
Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...
No results found.
In The News
Trend Micro and Google Cloud Deepen Collaboration to Advance AI-Driven Cybersecurity and Sovereign Cloud Solutions
Advancing proactive security across cloud environments and fighting online scams with AI
Supporting FIPS and CJIS For Secure IT Support: BeyondTrust Remote Support Remains Compliance-Ready as Standards Evolve
IT teams and support desks replacing non-compliant remote access tools are turning to BeyondTrust to help them meet modern security and compliance standards. BeyondTrust Remote Support is compliance-ready, with built-in capabilities to help IT teams align with FIPS, CJIS, FedRamp, and other key security and compliance mandates without added complexity ...
Tenable Unveils AI-Powered Breakthrough in Vulnerability Prioritisation – New Vulnerability Priority Rating delivers precise and actionable insights on the risks that matter most
Tenable®, the exposure management company, today announced the next evolution of its industry-leading Tenable Vulnerability Priority Rating (VPR) to sharpen precision and focus on risks that pose the greatest threat. Powered by generative AI, enriched threat intelligence and context-aware scoring, Tenable VPR enables organisations to quickly understand ...
Oracle Helps Customers Boost Supply Chain Efficiency with New Advanced Inventory Management Solution
New capabilities within Oracle Cloud SCM help organisations streamline warehouse operations, simplify inventory transactions, and accelerate order fulfilment
FICO Survey: 7 in 10 APAC bank leaders say scams and mule accounts are now the dominant fraud concern
Industry poll reveals social media as key scam channel, while data silos hinder bank response
Ericsson powers Telstra’s 5G evolution with Automated Carrier Aggregation on commercial network
Ericsson (NASDAQ: ERIC) has marked an industry milestone by deploying Automated Carrier Aggregation in more than 50 of Telstra’s live commercial 5G Advanced sites across North Sydney, making Telstra the first operator to use this feature in a live commercial network environment.
The innovative software capability, part of Ericsson 5G Advanced ...
NEW REPORT: 2025 Global Practitioner Survey
While AI adoption is accelerating and delivering substantial returns, a new report from Workiva uncovered alarming gaps in data quality, AI governance, and role-specific training for Australian companies. The report summarises the results of an independent global survey of 2,300 finance, sustainability, audit, and risk professionals responsible for ...
Tenable Comment for System Administrator Appreciation Day
System Administrator Appreciation Day on 25 July 2025 is a timely reminder of the critical and often invisible role sysadmins play in keeping the digital world running smoothly. While their work might not always make headlines, it forms the basis for every aspect of modern business operations, from system uptime and network stability to data security ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
