The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

Amidst an environment of ever-increasing digital threats, growing numbers of organisations are turning to cyber insurance as a means of protecting against the fallout from attacks.
60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

As cloud adoption continues to surge, with a projected market size of $830 billion in 2025, threat actors are increasingly targeting common vulnerabilities in the cloud.
Why SaaS Security Needs to Receive Constant Attention

Why SaaS Security Needs to Receive Constant Attention

ured by the promise of lower operating costs and improved flexibility, many businesses are continuing to increase their usage of software-as-a-service (SaaS) offerings.
Telecommunications Asset Deployments

Telecommunications Asset Deployments

The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives. The foundational infrastructure that allows the communication between devices and the collection of this data for processing and interpretation ...
F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5’s latest Curve of Convenience report shows, in the event of a data leak, majority of A/NZ consumers are unwilling to continue buying from the company involved (71%). Most of A/NZ (89%) are not comfortable with tracking mechanisms in their digital usage.
ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

Updated CMMI version addresses data management, people management, and remote/virtual workforce effectiveness.
ExtraHop Report Finds 82% of Australian and New Zealand Organisations Paid up in Ransomware Attacks

ExtraHop Report Finds 82% of Australian and New Zealand Organisations Paid up in Ransomware Attacks

Data uncovers correlation between cybersecurity debt and ransomware incidents
Recorded Future shares monthly cyber vulnerabilities report to help Australian organisations prioritise security measures

Recorded Future shares monthly cyber vulnerabilities report to help Australian organisations prioritise security measures

Five high risk vulnerabilities from March to watch out for in Microsoft, Adobe, Fortinet, and Samsung
No results found.

In The News

FICO Survey: Payment Scams Hit Home for Younger Aussies — Gen Z and Millennials 50% More Worried

FICO Survey: Payment Scams Hit Home for Younger Aussies — Gen Z and Millennials 50% More Worried

18- to 34-year-olds feel most vulnerable to payment fraud, identity theft 
Palo Alto Networks Bolsters SASE Capabilities for Modern Workplace

Palo Alto Networks Bolsters SASE Capabilities for Modern Workplace

Unveils Prisma Access Browser 2.0, the world's only SASE-native secure browser, perfect for the perimeterless, cloud-first world
Exabeam Appoints Kiley LePage as Chief Legal Officer

Exabeam Appoints Kiley LePage as Chief Legal Officer

New appointment to drive growth and global partnerships
Rethinking IT Sustainability To Achieve Outcomes That Matter To the Planet and the Bottom Line

Rethinking IT Sustainability To Achieve Outcomes That Matter To the Planet and the Bottom Line

Sustainability has become a critical business priority, connecting environmental responsibility with financial performance. For many companies, the focus is shifting from simply upgrading technology to maximising value across the entire device lifecycle. As businesses rethink how they manage their IT infrastructure, embedding sustainability into daily ...
BeyondTrust Names Industry Veteran Sean Malone as Chief Information Security Officer

BeyondTrust Names Industry Veteran Sean Malone as Chief Information Security Officer

Experienced security leader joins BeyondTrust to drive innovation and strengthen identity security leadership Sean Malone brings deep expertise in offensive security, cyber risk, and threat management to CISO role
Palo Alto Networks Announces Intent to Acquire Protect AI, a Game-Changing Security for AI Company

Palo Alto Networks Announces Intent to Acquire Protect AI, a Game-Changing Security for AI Company

The acquisition will enable secure pursuit of AI innovation with confidence by helping customers discover, manage, and protect against AI-specific security risks—securing AI end to end from development to runtime.
Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools

Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools

29 April 2025: Logicalis, the leading global technology service provider, has revealed that chief information officers (CIOs) are struggling to derive value from security investments amid an expanding threat landscape according to its annual CIO Report. Logicalis surveyed 1,000 global IT leaders, including more than 300 from Asia Pacific (APAC), ...
BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™

BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™

Complimentary new assessment--powered by Identity Security Insights--provides actionable recommendations to secure against vulnerabilities and help organisations tackle identity threats New assessment quickly reveals hidden Paths to Privilege, employing AI-based detection, and provides an initial set of prioritised findings to help guide security decisions
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This