The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Telecommunications Asset Deployments

Telecommunications Asset Deployments

The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives. The foundational infrastructure that allows the communication between devices and the collection of this data for processing and interpretation ...
F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5’s latest Curve of Convenience report shows, in the event of a data leak, majority of A/NZ consumers are unwilling to continue buying from the company involved (71%). Most of A/NZ (89%) are not comfortable with tracking mechanisms in their digital usage.
ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

Updated CMMI version addresses data management, people management, and remote/virtual workforce effectiveness.
ExtraHop Report Finds 82% of Australian and New Zealand Organisations Paid up in Ransomware Attacks

ExtraHop Report Finds 82% of Australian and New Zealand Organisations Paid up in Ransomware Attacks

Data uncovers correlation between cybersecurity debt and ransomware incidents
Recorded Future shares monthly cyber vulnerabilities report to help Australian organisations prioritise security measures

Recorded Future shares monthly cyber vulnerabilities report to help Australian organisations prioritise security measures

Five high risk vulnerabilities from March to watch out for in Microsoft, Adobe, Fortinet, and Samsung
91% of Australian organisations find the execution of essential security operation tasks challenging, Sophos survey finds

91% of Australian organisations find the execution of essential security operation tasks challenging, Sophos survey finds

Among these challenges, 71% struggle with Identifying the root causes behind an Incident, leaving them vulnerable to further malicious activity
Wesfarmers OneDigital and AWS sign agreement to transform the shopping experience for Aussies

Wesfarmers OneDigital and AWS sign agreement to transform the shopping experience for Aussies

Wesfarmers OneDigital today announced a five-year agreement with Amazon Web Services (AWS) to support the business’s developing data and digital platform to deliver the best value and services for its customers. The new agreement means AWS will be the strategic cloud provider across the Wesfarmers Group.
Australia’s Information Media and Telecoms Industry Under Spotlight as 50 Million Australian Records Lost to Cybercriminals

Australia’s Information Media and Telecoms Industry Under Spotlight as 50 Million Australian Records Lost to Cybercriminals

Flashpoint’s risk landscape report shows percentage of stolen Australian credentials in 2022 increases by 99%
No results found.

In The News

Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group

Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider. This strategic implementation will modernise and integrate business ...
Tenable Research in Verizon DBIR: Additional Research Analysis

Tenable Research in Verizon DBIR: Additional Research Analysis

Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited ...
New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses

Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into the evolving threat landscape of ransomware attacks. With cyber threats becoming more sophisticated and frequent, the report underlines the need for organisations to prioritise ...
Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

Armis Launches Vulnerability Intelligence Database to Enhance Preemptive Security

“The Armis Vulnerability Intelligence Database is a critical, accessible resource built by the security community, for the security community. It translates vulnerability data into real-world impact so that businesses can adapt quickly and make more informed decisions to manage cyber threats.”
CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

CyberArk Strengthens Identity Security for AI Agents with Accenture’s AI Refinery

Companies team to empower organisations to securely leverage AI agents
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

ConfusedComposer Exploits Hidden Cloud Service Dependencies
CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

This collaboration underscores CIOSO Global's mission to discover and champion innovative approaches to cybersecurity in an ever-evolving threat landscape, which includes AI and quantum computing-driven cyberattacks.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This