The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by ...
Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape
The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats
Why 2023 is the Year to Implement a Zero-Trust Strategy

Why 2023 is the Year to Implement a Zero-Trust Strategy

Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks.
How to establish a ‘security-aware’ business culture

How to establish a ‘security-aware’ business culture

When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck.
ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

New Research Highlights Uncertainty Around XDR Definition, Implementation and Resources Needed
More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

Alarmingly, more than 1 in 5 Aussies surveyed have fallen victim to an online dating/romance scam.
No results found.

In The News

Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights

Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform

ConfusedComposer Exploits Hidden Cloud Service Dependencies
CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions

This collaboration underscores CIOSO Global's mission to discover and champion innovative approaches to cybersecurity in an ever-evolving threat landscape, which includes AI and quantum computing-driven cyberattacks.
Akamai Research: AI-Powered Applications Drove 51 Billion Web Attacks in Asia Pacific and Japan, Up 73% Year-Over-Year

Akamai Research: AI-Powered Applications Drove 51 Billion Web Attacks in Asia Pacific and Japan, Up 73% Year-Over-Year

Australia was the most targeted country by web and API attacks in APJ
Rubrik Appoints Kavitha Mariappan as Chief Transformation Officer

Rubrik Appoints Kavitha Mariappan as Chief Transformation Officer

Sydney, April 24, 2025 — Building on a milestone year for the company, Rubrik (NYSE: RBRK) today announced the appointment of Kavitha Mariappan as its Chief Transformation Officer (CTxO). This newly created role is aimed at deepening executive engagement and accelerating cyber resilience outcomes for global enterprises and public sector ...
Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Cloud application monitoring and security platform Datadog today released its new report, the State of DevSecOps 2025, which found that only a fraction of critical vulnerabilities are truly worth prioritising. To better understand the severity of a vulnerability, Datadog developed a prioritisation algorithm that factored in runtime context to its ...
Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), the industry’s first endpoint security solution to dynamically tailor hardening for each user—ensuring that security configurations align precisely with user-intended privileges and behaviours and continuously adapt ...
Datadog Makes Strategic Acquisition of Metaplane

Datadog Makes Strategic Acquisition of Metaplane

Datadog has announced it has acquired Metaplane, an end-to-end data observability platform that provides advanced machine learning-powered monitoring and column-level lineage to prevent, detect and resolve data quality issues across a company’s entire data stack. With the emergence of AI and widespread adoption of platforms like Snowflake and ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This