The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

Artificial Intelligence and AIOps May Be the Key to Understanding Today’s World of Exploding Data

“The Library of Babel” is an imaginary library containing countless rooms and books with every possible combination of letters and numbers.
Decoy Dog Is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Decoy Dog Is No Ordinary Pupy – Infoblox Reveals Shift in Malware Tactics After Initial Discovery

Infoblox Inc., the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection, today published a second threat report with critical updates on “Decoy Dog,” the remote access trojan (RAT) toolkit they discovered and disclosed in April 2023.
Ways to Reduce the Risk of Burnout in Your IT Security Team

Ways to Reduce the Risk of Burnout in Your IT Security Team

With organisations experiencing a constantly growing wave of cyberattacks, many IT security teams are feeling the pressure. Stressful work environments and long hours are resulting in staff feeling overwhelmed and burnt out.
How Securing Remote Management Tools Provides Better Protection for Businesses

How Securing Remote Management Tools Provides Better Protection for Businesses

The latest data reveals that Australian small businesses lost almost $13.7 million to scams in 2022, an increase of 95 per cent compared to 2021, according to the Australian Competition and Consumer Commission (ACCC).
Forescout Uncovers the 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Forescout Uncovers the 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, Forescout released the first Enterprise of Things Security Report, followed in 2022 with the Riskiest Connected Devices in Enterprise Networks report.
Five Ways to Ensure Compliance When Managing Customer Data

Five Ways to Ensure Compliance When Managing Customer Data

As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.
Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies in Geopolitical Competition

Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies in Geopolitical Competition

Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.
No results found.

In the News

New Sophos Report Finds AI Adoption and Increased Threat Activity Amongst Drivers Keeping Cybersecurity Burnout High in Australia in 2025

New Sophos Report Finds AI Adoption and Increased Threat Activity Amongst Drivers Keeping Cybersecurity Burnout High in Australia in 2025

Shadow AI, resource and budget shortages and meeting compliance and regulatory requirements put pressure on security teams
Claroty Achieves AWS Manufacturing and Industrial Competency for OT Security

Claroty Achieves AWS Manufacturing and Industrial Competency for OT Security

Claroty achieves AWS Manufacturing and Industrial Competency for OT Security. Achievement highlights company’s ability to provide unrivalled OT expertise for securing mission-critical infrastructure.
Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

New detection feature helps educators detect potential AI misuse
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats
CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

Replaces legacy SSO with CyberArk to enable secure, frictionless workforce access
HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech’s VaultNXT powered by Rubrik provides ransomware detection and remediation, ensuring data integrity for complete cyber resilience
Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years. “While patches are available for ...
Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This