The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Forescout Uncovers The 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT
Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, Forescout released the first Enterprise of Things Security Report, followed in 2022 with the Riskiest Connected Devices in Enterprise Networks report.

Five Ways to Ensure Compliance when Managing Customer Data
As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow
Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition
Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.

How Visible Is My Profile on the Internet?
There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What is profile visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...

Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud
Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations
While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint
Overseas entities present a serious cyber risk of ransomware and state-sponsored threats
No results found.
In The News
HID and ASSA ABLOY Recognised with Renowned Red Dot Award for Innovative Biometric eGate Design
Combining an Aesthetically Appealing Design, Function and Innovation, the BG100 Speedgate Sets New Benchmark for Passenger Experience in Air Travel
State of Data Readiness – Report Suggests Large Gap Between Expectation And Reality
A new report released by Commvault has revealed a significant gap between perceived and actual cyber readiness among Australian and New Zealand (ANZ) organisations—raising alarm bells for boards and business leaders across the region.
Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data
Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data
New Solution Protects Against Accidental and Malicious Data Loss, Ensures Business Continuity and Strengthens Cyber Resilience
Cisco Appoints Ben Dawson as New SVP for APJC Sales and APJC President
Singapore, July 9, 2025 – Cisco, the worldwide technology leader, today announced the appointment of Ben Dawson as the new President for its Asia Pacific, Japan and Greater China (APJC) business, succeeding Dave West. He will report to Oliver Tuszik, Executive Vice President of Global Sales and Chief Sales Officer, effective Monday, July 28, ...
Sophos Managed Risk Expands Capabilities with Internal Attack Surface Management (IASM) to Identify and Guide Organisations to Mitigate Internal Vulnerabilities
Expands Visibility of Internal Exposures within an Organisation’s Environment
Excite Technology Services Closes More Than $3 million In June, Continuing Growth Momentum
Excite Technology Services has closed out the financial year with its strongest monthly performance to date, securing more than $3 million through June in new deals across its cyber security, digital forensics, and training service lines.
Wavelink Signs Distribution Agreement with Cloudian to Support Growing Demand for Artificial Intelligence-ready, Cloud-native Storage Solutions
July 08, 2025 – Wavelink, an Infinigate Group company and leader in technology distribution, services, and business development in Australia and New Zealand, has signed a distribution agreement with Cloudian, a global leader in S3-compatible file and object storage. Under the agreement, Wavelink will distribute Cloudian’s portfolio throughout ...
Wild Tech Strengthens Asia Pacific Presence With Appointment of Tiffany Ong As Head of Microsoft in Singapore
Wild Tech has appointed Tiffany Ong as its new Head of Microsoft in Singapore, strengthening the company’s APAC leadership bench as it accelerates digital transformation for enterprise and small-to-mid-market (SMC) organisations.
With more than a decade of experience in ERP consulting and enterprise cloud sales, Ong brings deep product fluency ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
