The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

IoT Software vulnerability in the IKEA TRÅDFRI smart lighting system

Researchers at the Synopsys Cybersecurity Research Center (CyRC) have discovered an availability vulnerability in the IKEA TRÅDFRI smart lighting system.
What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

What is a ‘Denial of Service’ software vulnerability and what impact could it have on you?

By Jonathan Knudsen, Head of Global Research, Synopsys Cybersecurity Research Center The Synopsys Cybersecurity Research Center (CyRC) recently published a vulnerability advisory related to Open5GS, which is full of dense technical detail. But what does it all mean for organizations? What’s the potential impact? To answer that, let’s take a step ...
Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
No results found.

In The News

Arctic Wolf Threat Report: 96 Percent of Ransomware Cases Included Data Theft as Cybercriminals Double Down on Extortion

Arctic Wolf Threat Report: 96 Percent of Ransomware Cases Included Data Theft as Cybercriminals Double Down on Extortion

Arctic Wolf®, a global leader in security operations, today released its annual Arctic Wolf Threat Report, offering an in-depth analysis of the evolving cyber threat landscape. This year’s findings underscore how cybercriminals are adapting their methods to bypass stronger security defenses—prioritising data theft, refining business email compromise ...
BeyondTrust Pathfinder Delivers a One-Platform Approach to Identity-Centric Security

BeyondTrust Pathfinder Delivers a One-Platform Approach to Identity-Centric Security

Unified platform empowers customers to break free from fragmented, siloed solutions that leave organisations vulnerable to identity threats, and to benefit from adaptive, intelligent, and risk-aware identity security Fully integrated, AI-driven, identity security platform unifies visualisation, management, and governance of identities, entitlements, ...
BT’s Global Fabric Goes Live With Customer Traffic

BT’s Global Fabric Goes Live With Customer Traffic

Debut of Global Fabric Internet, the first connectivity service delivered via BT’s new, transformational network-as-a-service (NaaS) platform, Global Fabric. A growing pipeline of customers, services and features are being added over the coming weeks and months.
CrowdStrike Expands Leadership in Hybrid Identity Protection with Falcon Identity Protection for Microsoft Entra ID

CrowdStrike Expands Leadership in Hybrid Identity Protection with Falcon Identity Protection for Microsoft Entra ID

About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
Nozomi Networks Labs Report Finds Wireless Networks Unprotected as Threats to Critical Infrastructure Escalate

Nozomi Networks Labs Report Finds Wireless Networks Unprotected as Threats to Critical Infrastructure Escalate

SYDNEY AUSTRALIA, February 27, 2025 — The latest Nozomi Networks Labs OT & IoT Security Report released today finds wireless networks woefully unprotected as threat actors continue to gain deep access into critical infrastructure. In the 2nd half of last year, critical infrastructure organisations in the United States saw the highest number of ...
CrowdStrike is the First Cloud-Native Cybersecurity ISV to Exceed $1 Billion in Annual AWS Marketplace Sales

CrowdStrike is the First Cloud-Native Cybersecurity ISV to Exceed $1 Billion in Annual AWS Marketplace Sales

About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
CrowdStrike Falcon® Cloud Security Supported on Oracle Cloud Infrastructure

CrowdStrike Falcon® Cloud Security Supported on Oracle Cloud Infrastructure

About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
Cisco Expands Partnership with NVIDIA to Accelerate AI Adoption in the Enterprise

Cisco Expands Partnership with NVIDIA to Accelerate AI Adoption in the Enterprise

Bringing together two of the most utilized networking portfolios, Cisco Silicon One and NVIDIA Spectrum-X, will offer enterprises unmatched flexibility and choice in AI data center investments
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This