The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Don’t Take The Bus Lane, Take The Fastlane

Don’t Take The Bus Lane, Take The Fastlane

Don’t Take The Bus Lane, Take The Fastlane From Karissa A. Breen Fastlane Solutions celebrates the launch of their new strategy   On Thursday 24th August, I hosted the Fastlane new strategy launch event at the exquisite Vini Divini Wine Lab on Carrington Street in Sydney. The event kicked off with a diverse selection of wines, and attendees ...
Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Since it first appeared late last year, ChatGPT has quickly built an extensive user base keen to put the evolving tool through its paces.
Why Banks are Increasingly Turning to External IT Security Resources

Why Banks are Increasingly Turning to External IT Security Resources

Thwarting cyberattacks is a key task for any CIO in the banking industry, however it’s not the only security-related challenge keeping them awake at night.
Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint has published its July Cyber Threat Intelligence Index which shows Australia was in the top 10 countries for ransomware attacks last month.
Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Report underscores that email is the most exploited threat vector, Phishing remains borderless and attackers are increasingly impersonating trusted name brands
Achieving a Robust Zero Trust Environment

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there.
How Businesses Today can Prevent Advanced Cyber Threats

How Businesses Today can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.
Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...
No results found.

In The News

Semperis Research Uncovers Critical Flaw in Windows Server 2025 Exposing Managed Service Accounts

Semperis Research Uncovers Critical Flaw in Windows Server 2025 Exposing Managed Service Accounts

Semperis Researcher Adi Malyanker develops a new tool dubbed GoldenDMSA that incorporates the attack’s logic, enabling efficient study and simulation of this novel technique.
Tenable Research Uncovers Remote Code Execution Vulnerability in Oracle Code Editor and its Integrated Services

Tenable Research Uncovers Remote Code Execution Vulnerability in Oracle Code Editor and its Integrated Services

Tenable, the exposure management company, has identified a Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure (OCI) Code Editor, a service designed for developers working within Oracle’s Cloud Shell ecosystem. This vulnerability could have allowed attackers to run malicious code on a server without needing direct access. The ...
77% of Australian Organisations Rely on MSPs to Manage the Security Challenges of Growth

77% of Australian Organisations Rely on MSPs to Manage the Security Challenges of Growth

New Research Shows Australian Companies Struggle with IT Complexity, Spiraling Tool Sprawl and Evolving Strategies
Check Point Launches Quantum Spark 2500 Series to Deliver Enterprise-Grade Security and Future-Ready Connectivity for Small and Medium Businesses

Check Point Launches Quantum Spark 2500 Series to Deliver Enterprise-Grade Security and Future-Ready Connectivity for Small and Medium Businesses

New lineup introduces Wi-Fi 7, 5G, AI-powered threat prevention, and streamlined management, that helps small and medium businesses stay secure, connected, and resilient
CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category

CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category

Advanced capabilities help implement identity-first security for agentic AI at scale
Datadog and AWS Enhance Region’s Infrastructure for A/NZ Compliance and Security

Datadog and AWS Enhance Region’s Infrastructure for A/NZ Compliance and Security

Local data storage capacity allows Datadog’s customers and partners to meet data residency and security requirements across A/NZ
CIOSO Global Founding Partner Greg Sullivan Joins Technology Partners

CIOSO Global Founding Partner Greg Sullivan Joins Technology Partners

Greg will coach CIOs, CISOs, and other senior technology and cybersecurity executives through leadership transitions and cyber-risk inflection points. With decades of executive-level cybersecurity expertise, Greg brings a unique blend of strategic insight and operational expertise that will help our clients build resilient, future-ready organizations.
Okta and Palo Alto Networks Unify AI-Driven Security to Fight Identity Attacks

Okta and Palo Alto Networks Unify AI-Driven Security to Fight Identity Attacks

Joint solutions help reduce the risk of breaches by preventing unauthorised access and mitigating dangerous security blindspots
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This