The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Forescout Uncovers the 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Forescout Uncovers the 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, Forescout released the first Enterprise of Things Security Report, followed in 2022 with the Riskiest Connected Devices in Enterprise Networks report.
Five Ways to Ensure Compliance When Managing Customer Data

Five Ways to Ensure Compliance When Managing Customer Data

As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.
Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies in Geopolitical Competition

Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies in Geopolitical Competition

Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.
How Visible Is My Profile on the Internet?

How Visible Is My Profile on the Internet?

There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What Is Profile Visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...
Cloud Assets the Biggest Targets for Cyber-attacks in Australia as More Sensitive Data Moves to Cloud

Cloud Assets the Biggest Targets for Cyber-attacks in Australia as More Sensitive Data Moves to Cloud

Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.
Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...
Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Overseas entities present a serious cyber risk of ransomware and state-sponsored threats
No results found.

In the News

Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years. “While patches are available for ...
Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Sydney, Australia – 27 August 2025 – Axis Communications Oceania returns as headline sponsor of Security & Integrate 2025, showcasing intelligent technologies that transform insight into action.  In a world of complex security challenges, Axis is redefining safety, security, business intelligence, and operational efficiency with cutting-edge ...
Phishing Gangs Use Split and Nested QR Codes to Evade Detection in New Wave of ‘Quishing’ Attacks

Phishing Gangs Use Split and Nested QR Codes to Evade Detection in New Wave of ‘Quishing’ Attacks

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks.
Global CloudCon Summit Lands in Sydney

Global CloudCon Summit Lands in Sydney

Technology summit, CloudCon, is returning to Sydney for an immersive two-day experience with some of the world’s leading cloud and Kubernetes experts at the International Convention Centre on 9 and 10 September 2025.
Trend Micro Named a Leader in Exposure Management by IDC MarketScape

Trend Micro Named a Leader in Exposure Management by IDC MarketScape

Measurable reduction of operational silos and cyber risk delivered with Trend Vision One™ Cyber Risk Exposure Management
Introducing SailPoint Accelerated Application Management: A Breakthrough Approach to Manage and Govern Applications at Scale With Intelligence

Introducing SailPoint Accelerated Application Management: A Breakthrough Approach to Manage and Govern Applications at Scale With Intelligence

 An industry-first solution that combines application intelligence with systematic governance, enabling organisations to scale from dozens to hundreds of governed applications
Kinetic IT Named Pre-approved Supplier on WA Government’s IT Procurement Panel (CUATIS2024)

Kinetic IT Named Pre-approved Supplier on WA Government’s IT Procurement Panel (CUATIS2024)

August 26, 2025 - Kinetic IT has been appointed as a pre-approved supplier to the Western Australian Government’s CUATIS2024 Technology Infrastructure and Solutions panel, giving agencies a prequalified route to market that reduces procurement complexity and accelerates delivery. CUATIS2024 is the State Government’s new whole-of-government buying ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This