The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

It’s been 12 Months since the Optus Breach. Now What?
Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...

Why a supportive security culture will bolster disaster recovery efforts during a cyberattack
In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.

How purpose-built database security solutions ensure vulnerabilities aren’t overlooked
The perimeters of technological defences are shifting, and—in some cases—disappearing altogether.

IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages
SolarWinds, the leading provider in software management solutions and observability serving 96% of the Fortune 500, has released its 10th annual IT Trends Report, detailing the impact observability solutions have on navigating challenges from digital transformation, moving to the cloud and remote work—both within the IT department and beyond.

Automating evidence collection will improve your cloud incident response process
A primary concern of any security team is having the ability to respond to security events efficiently and in a timely manner, well before they are at risk of escalating. The lack of automation coupled with alert fatigue often leads to overlooked risk, where seemingly low-severity detections may actually be connected to something far more malicious. To ...

How Water Utilities can Boost Their Cybersecurity Resilience
Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses.

Best-Practice Ways to Prevent Phishing Attacks
They’ve been a focus of attention for IT security teams for years, yet the threats posed by phishing campaigns are showing no sign of easing. Phishing remains a popular tactic for cybercriminals for one simple reason: it works. If a staff member can be tricked into clicking on a link or opening an email attachment containing malicious code, the result ...

Over 600,000 Australian SMBs would not survive a privacy breach, Zoho research reveals
Privacy awareness and concern is increasing amongst Australian SMBs in the wake of Optus and Medibank attacks, but action is too low. One in four local small businesses would fail to survive the financial or reputational damage of a privacy breach. One in four do not understand what is expected of their business as part of recent Privacy Act changes.
No results found.
In The News
From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia
ESET launches ESET Cybersecurity Awareness Training in Australia, helping local businesses to avoid breaches resulting from human error.
ESET Cybersecurity Awareness Training helps meet ISM-0252, NIS2, HIPAA, PCI, SOX, GDPR, and CCPA compliance requirements, as well as insurance requirements.
This online educational and testing source puts 30 years ...
Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research
Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features
Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail.
On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats
New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports
Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security
SYDNEY, August 13, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security ...
Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier
Site reliability engineers and developers gain access to powerful log analytics without the overhead of managing Elastic Stack
New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure
A new industry study has quantified the potential global financial impact of operational technology (OT) cyber incidents at up to US $329.5 billion in a severe but plausible scenario, with business interruption losses accounting for more than half that amount.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
