The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How To Manage The Media Spotlight During A Cybersecurity Incident
The recent high profile cybersecurity attacks on Medibank and Optus, as well as several that have garnered less attention has left corporate Australia scrambling. While technical teams are focussing on risks and vulnerabilities, wise organisations are taking a broader view and developing disaster plans for how they are going to communicate with the ...

Security Navigator 2023 shows Cyber Extortion dominates landscape as 40% is malware, attackers target Europe and beyond, and SMEs, manufacturing and the public sector particularly exposed
Orange Cyberdefense, the specialist arm of Orange Group dedicated to cybersecurity, has today launched its annual security research report, the Security Navigator 2023. Amongst other things, this year’s in-depth analysis examined 99,506 potential incidents that were investigated and triaged by our CyberSOC teams, an increase of 5% from the 2022 report. ...

Rapid7 Assesses the ASX 200 Attack Surface
Industrial sector leads all industries in their risk exposure

Are ransomware attacks becoming a cost of doing business in Australia?
It's easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly ...

Let’s stop playing the blame game and start taking more responsibility for cybersecurity
You will know the drill if you work in cybersecurity: something goes wrong, and immediately the recriminations begin. Vendors, customers, consultants and service providers form an orderly circle, face off, and begin blaming and shaming.
We all know deep down that this circular firing squad routine is toxic and counterproductive, but it is an ...

Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability
Tenable®, the Exposure Management company, today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organisations remain vulnerable to the Log4Shell ...

Lookout Threat Lab Discovers Predatory Loan Apps on Google Play and Apple App Store
Data exfiltration from devices used to pressure for repayment by harassing the customer or their contacts

9 Out of 10 Organisations in Asia-Pacific Report Digital Trust as ‘Extremely Important’: DigiCert Survey
In APAC, organisations report digital trust as important due to the expanding threat landscape within the region. Also, 91% of consumers are concerned about cyber threats, more than the rest of the world.
No results found.
In The News
Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain
Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds
Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta
All finalists are members of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their security products and services with Microsoft’s security technology.
SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations
SecurityBridge integrates seamlessly with enterprise SIEM and ITSM solutions, offering built-in SAP security monitoring rules customized to fit organizational needs.
Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud
Proofpoint, Inc., a leading cybersecurity and compliance company, has today released new research showing almost one in four (23%) of Australia’s top-ranked hospitals is still lagging behind on basic cybersecurity measures, subjecting patients, healthcare professionals, and stakeholders to a higher risk of email fraud. While the data shows some ...

ExeQuantum and CyberWaze Announce Strategic Partnership to Bring Post-Quantum Cryptography to Global Cybersecurity
Melbourne, Australia & Dubai, UAE – March 2025 – ExeQuantum, a leader in Post-Quantum Cryptography (PQC) solutions, has officially partnered with CyberWaze, a global cybersecurity consulting and managed security services provider. This collaboration marks a significant milestone in the adoption of quantum-resistant security, ensuring businesses ...
Cybersecurity Needs Diversity: ESET’s 2025 Scholarship to Empower Women Leaders
Since its launch in 2016, the ESET Women in Cybersecurity Scholarship has supported over 28 women worldwide in pursuing careers in technology. Now expanding to Singapore and India in 2025, alongside the U.S., Canada, Australia, and the U.K., the initiative continues to build a more inclusive and diverse cybersecurity workforce globally.
Sovereign Australian Prime Alliance Welcomes Much Needed Reforms to Commonwealth Procurement Rules
The Sovereign Australian Prime Alliance (SAPA) congratulates the Albanese Government on its announcement today of much needed reforms to the Commonwealth Procurement Rules to define an Australian business, in the context of the Commonwealth procurement framework as:
“a business, including any parent business, that:
has 50% or more Australian ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..