The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by ...
Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape
The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats
Why 2023 is the Year to Implement a Zero-Trust Strategy

Why 2023 is the Year to Implement a Zero-Trust Strategy

Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks.
How to establish a ‘security-aware’ business culture

How to establish a ‘security-aware’ business culture

When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck.
ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

New Research Highlights Uncertainty Around XDR Definition, Implementation and Resources Needed
More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

Alarmingly, more than 1 in 5 Aussies surveyed have fallen victim to an online dating/romance scam.
No results found.

In The News

Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Cloud application monitoring and security platform Datadog today released its new report, the State of DevSecOps 2025, which found that only a fraction of critical vulnerabilities are truly worth prioritising. To better understand the severity of a vulnerability, Datadog developed a prioritisation algorithm that factored in runtime context to its ...
Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), the industry’s first endpoint security solution to dynamically tailor hardening for each user—ensuring that security configurations align precisely with user-intended privileges and behaviours and continuously adapt ...
Datadog Makes Strategic Acquisition of Metaplane

Datadog Makes Strategic Acquisition of Metaplane

Datadog has announced it has acquired Metaplane, an end-to-end data observability platform that provides advanced machine learning-powered monitoring and column-level lineage to prevent, detect and resolve data quality issues across a company’s entire data stack. With the emergence of AI and widespread adoption of platforms like Snowflake and ...
Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam announced the release of its first Environmental, Social, and Governance (ESG) Report, coinciding with the 55th anniversary of Earth Day. This landmark report showcases Veeam's commitment to inclusively creating a sustainable future while maintaining the highest standards of trust and governance. “Today at VeeamON, we are proud to launch our ...
CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

Veeam announced a new partnership with CrowdStrike to deliver centralised visibility of critical data and advanced threat detection through integration with the Veeam Data Platform. The jointly developed product integration creates a more secure environment for shared customers, helping identify threats before, during and after an attack to enable ...
SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

This innovative tool leverages artificial intelligence (AI) to identify and explain vulnerabilities in custom Advanced Business Application Programming (ABAP) code, empowering SAP developers and security teams to remediate risks faster and more efficiently.
NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne today announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so they can prioritise and verify the ...
CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security Falcon platform secures the entire identity attack lifecycle – from initial access to privilege escalation and lateral movement – across hybrid environments; extends Charlotte AI Agentic Detection Triage to identity-based attacks
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This