The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Decoy Dog Is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Decoy Dog Is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Infoblox Inc., the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection, today published a second threat report with critical updates on “Decoy Dog,” the remote access trojan (RAT) toolkit they discovered and disclosed in April 2023.
Ways to Reduce the Risk of Burnout in Your IT Security Team

Ways to Reduce the Risk of Burnout in Your IT Security Team

With organisations experiencing a constantly growing wave of cyberattacks, many IT security teams are feeling the pressure. Stressful work environments and long hours are resulting in staff feeling overwhelmed and burnt out.
How Securing Remote Management Tools Provides Better Protection for Businesses

How Securing Remote Management Tools Provides Better Protection for Businesses

The latest data reveals that Australian small businesses lost almost $13.7 million to scams in 2022, an increase of 95 per cent compared to 2021, according to the Australian Competition and Consumer Commission (ACCC).
Forescout Uncovers the 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Forescout Uncovers the 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, Forescout released the first Enterprise of Things Security Report, followed in 2022 with the Riskiest Connected Devices in Enterprise Networks report.
Five Ways to Ensure Compliance When Managing Customer Data

Five Ways to Ensure Compliance When Managing Customer Data

As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.
Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies in Geopolitical Competition

Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies in Geopolitical Competition

Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.
How Visible Is My Profile on the Internet?

How Visible Is My Profile on the Internet?

There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What Is Profile Visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...
No results found.

In the News

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

A new industry study has quantified the potential global financial impact of operational technology (OT) cyber incidents at up to US $329.5 billion in a severe but plausible scenario, with business interruption losses accounting for more than half that amount.
Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, With 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, With 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

A new IDC InfoBrief, “Agentic Automation: Unlocking Seamless Orchestration for the Modern Enterprise”, sponsored by UiPath (NYSE: PATH), a global leader in agentic automation, has revealed 41% of Australian organisations are already using agentic AI and another 50% are planning to use it in the next six months.
CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

Recognition Cites CyberArk’s Innovation Focus, Platform Capabilities and Bold Vision 
Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Company positioned closest to the centre of the Radar, underscoring its ability to help customers understand their dynamic cloud environments beyond the capacity of competitive solutions
Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

ISACA, the global professional association supporting digital trust professionals, has announced the appointment of Australian cybersecurity expert Jamie Norton as Vice Chair of its 2025–2026 Board of Directors. Norton, currently Chief Information Security Officer (CISO) for the Australian Securities and Investments Commission (ASIC), steps into the ...
Fortinet Expands FortiCloud With Identity, Secure Storage, and Communication Services to Power the Modern Enterprise

Fortinet Expands FortiCloud With Identity, Secure Storage, and Communication Services to Power the Modern Enterprise

New services enhance identity management, secure file storage and recovery, and communication, advancing the Fortinet Security Fabric and global cloud network vision 
Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Bug bounty program incentivises security research to make customers and industry safer 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This