The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

91% of Australian respondents experienced at least one ransom attack
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.  Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.  This event was hosted ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you from becoming a victim. High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. In the following article, we will showcase a range of real-world phishing ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

We already know that phishing is a significant threat to businesses and individuals. Anti-phishing tips, such as “always hover over the link in an email before clicking” or “be wary of emails with poor grammar”, are meant to help us avoid being tricked by phishing emails. These tips have been circulating on the internet for over a decade, but sadly, ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
No results found.

In The News

Scale Computing and Bitdefender partner to deliver added cybersecurity for edge computing and private cloud infrastructure

Scale Computing and Bitdefender partner to deliver added cybersecurity for edge computing and private cloud infrastructure

Scale Computing, a market leader in edge computing, virtualisation, and hyperconverged infrastructure, today announced a strategic partnership with Bitdefender, a global cybersecurity leader, to deliver advanced, integrated threat protection for private cloud and edge environments. The new joint solution combines the self-healing automation and ...
Kyndryl Unveils Agentic AI Framework that Dynamically Evolves to Drive Enhanced Business Performance

Kyndryl Unveils Agentic AI Framework that Dynamically Evolves to Drive Enhanced Business Performance

Kyndryl taps into its decades of infrastructure-level expertise to deploy an enterprise-grade Framework with intelligent AI agents that learn, adapt and evolve to turn insights into action The Kyndryl Agentic AI Framework self-organises, scales, and securely executes tasks across diverse IT estates and complex workflows to increase efficiency and ...

KnowBe4 Research Reveals That Fake Internal Emails Dominate Phishing Simulation Clicks

KnowBe4’s Q2 2025 Phishing Simulation Roundup report underscores employees’ continued vulnerability to malicious emails that appear familiar, whether from HR, IT, or major brands.
Semperis Research Uncovers Critical Flaw in Windows Server 2025 Exposing Managed Service Accounts

Semperis Research Uncovers Critical Flaw in Windows Server 2025 Exposing Managed Service Accounts

Semperis Researcher Adi Malyanker develops a new tool dubbed GoldenDMSA that incorporates the attack’s logic, enabling efficient study and simulation of this novel technique.
Tenable Research Uncovers Remote Code Execution Vulnerability in Oracle Code Editor and its Integrated Services

Tenable Research Uncovers Remote Code Execution Vulnerability in Oracle Code Editor and its Integrated Services

Tenable, the exposure management company, has identified a Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure (OCI) Code Editor, a service designed for developers working within Oracle’s Cloud Shell ecosystem. This vulnerability could have allowed attackers to run malicious code on a server without needing direct access. The ...
77% of Australian Organisations Rely on MSPs to Manage the Security Challenges of Growth

77% of Australian Organisations Rely on MSPs to Manage the Security Challenges of Growth

New Research Shows Australian Companies Struggle with IT Complexity, Spiraling Tool Sprawl and Evolving Strategies
Check Point Launches Quantum Spark 2500 Series to Deliver Enterprise-Grade Security and Future-Ready Connectivity for Small and Medium Businesses

Check Point Launches Quantum Spark 2500 Series to Deliver Enterprise-Grade Security and Future-Ready Connectivity for Small and Medium Businesses

New lineup introduces Wi-Fi 7, 5G, AI-powered threat prevention, and streamlined management, that helps small and medium businesses stay secure, connected, and resilient
CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category

CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category

Advanced capabilities help implement identity-first security for agentic AI at scale
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This