The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Telecommunications Asset Deployments

Telecommunications Asset Deployments

The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives. The foundational infrastructure that allows the communication between devices and the collection of this data for processing and interpretation ...
F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5’s latest Curve of Convenience report shows, in the event of a data leak, majority of A/NZ consumers are unwilling to continue buying from the company involved (71%). Most of A/NZ (89%) are not comfortable with tracking mechanisms in their digital usage.
ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE

Updated CMMI version addresses data management, people management, and remote/virtual workforce effectiveness.
ExtraHop Report Finds 82% of Australian and New Zealand Organisations Paid up in Ransomware Attacks

ExtraHop Report Finds 82% of Australian and New Zealand Organisations Paid up in Ransomware Attacks

Data uncovers correlation between cybersecurity debt and ransomware incidents
Recorded Future shares monthly cyber vulnerabilities report to help Australian organisations prioritise security measures

Recorded Future shares monthly cyber vulnerabilities report to help Australian organisations prioritise security measures

Five high risk vulnerabilities from March to watch out for in Microsoft, Adobe, Fortinet, and Samsung
91% of Australian organisations find the execution of essential security operation tasks challenging, Sophos survey finds

91% of Australian organisations find the execution of essential security operation tasks challenging, Sophos survey finds

Among these challenges, 71% struggle with Identifying the root causes behind an Incident, leaving them vulnerable to further malicious activity
Wesfarmers OneDigital and AWS sign agreement to transform the shopping experience for Aussies

Wesfarmers OneDigital and AWS sign agreement to transform the shopping experience for Aussies

Wesfarmers OneDigital today announced a five-year agreement with Amazon Web Services (AWS) to support the business’s developing data and digital platform to deliver the best value and services for its customers. The new agreement means AWS will be the strategic cloud provider across the Wesfarmers Group.
Australia’s Information Media and Telecoms Industry Under Spotlight as 50 Million Australian Records Lost to Cybercriminals

Australia’s Information Media and Telecoms Industry Under Spotlight as 50 Million Australian Records Lost to Cybercriminals

Flashpoint’s risk landscape report shows percentage of stolen Australian credentials in 2022 increases by 99%
No results found.

In The News

Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Veriti is the first to introduce pre-emptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments 
Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

AI security solution integrated with NVIDIA Enterprise AI Factory validated design  SYDNEY, MAY 20, 2025 – Global enterprise cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its bringing powerful and simplified security capabilities to NVIDIA Enterprise AI Factory validated design, helping organisations worldwide ...
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies

Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies

Issued on 22 May 2025, a joint advisory from  ASD’s ACSC, CISA, NSA, FBI and more than a dozen allied agencies warning that Russia’s GRU Unit 26165 (APT28/Fancy Bear) has been spying on Western logistics and technology firms supporting aid to Ukraine since 2022, using password-spray and spear-phishing campaigns plus exploits for Outlook, WinRAR, ...
BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management

BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management

BeyondTrust’s forward-looking approach to securing human and non-human identities earns high marks from analyst firm Report highlights BeyondTrust’s scalability, native integrations, and developer-friendly approach to secure machine and application secrets
APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics

APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics

A Russian military cyber unit, known as APT28 or "Fancy Bear," has intensified its cyber-espionage efforts against organisations supporting Ukraine, according to a joint advisory issued by the UK's National Cyber Security Centre (NCSC) and allied intelligence agencies including the US and Australia. Operating under Russia’s military intelligence ...
Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

New research shows AI is driving cybersecurity compromises amid rising data volumes, LLM threats, and growing public cloud concerns
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This