The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.

For The Sake Of Its Cybersecurity, Australia Must Come Together
The Pandemic Has Exacerbated Existing Security Problems
As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responses also had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...

Tackling Australia’s Evolving Threat Landscape – Zscaler
The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud
The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...

Business cyber risks and the humble home network
Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...

Personal Liability in Cyber – What Can We Expect?
The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability.

Absolute Advances New Era of Resilient Zero Trust
New 451 Research Report Underscores Need for Resiliency in Zero Trust, Achieved via Integrated Endpoint Security, Secure Access, Network Visibility, and Management

New White Paper from ISACA Delves into Risk Tolerance
The first step to addressing the myriad types of risk that need to be managed in an organisation is understanding risk appetite and tolerance. ISACA has released two new resources that offer guidance in both areas: the Using Risk Tolerance to Support Enterprise Strategy white paper and Risk Scenarios Toolkit.
No results found.
In The News
Wavelink Launches 5thWave to Revolutionise Asset and Customer Lifecycle Management
March 20, 2025 — Wavelink, an Infinigate Group company and a leader in technology distribution, services, and business development in Australia and New Zealand (ANZ), has launched 5thWave, a powerful asset and customer lifecycle management service designed to help partners optimise renewals, upgrades, and technology refresh cycles. 5thWave automates ...
Rubrik and Deloitte Team Up to Deliver Cyber Resilience
PALO ALTO, Calif., March 18, 2025— As the threat landscape continuously evolves, the call for robust data security solutions has never been more urgent. Today, Rubrik (NYSE: RBRK), a leading cyber security company, is proud to announce a strategic alliance with Deloitte. Together, the companies will collaborate to deliver advanced data security and ...
Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease
Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks.
The ...
CrowdStrike Collaborates with NVIDIA to Advance Agentic AI in Cybersecurity, Pioneer Testing of NVIDIA Reasoning Models
Powered by NVIDIA NIM microservices—with reasoning models in testing—CrowdStrike's Charlotte AI delivers 2x faster detection triage with 50% less compute, maximizing SOC efficiency
Nozomi Networks Named to Fast Company’s World’s Most Innovative Companies 2025 List
The OT and IoT cybersecurity company is recognised for its AI-powered solutions protecting global critical infrastructure from the growing risk of cyber threats
UiPath to Unveil Latest Agentic Automation Solutions at Agentic AI Summit
UiPath to hold Agentic AI Summit on March 25 to demonstrate its latest agentic automation innovations and how UiPath customers are achieving transformational outcomes with these solutions
Lenovo Report Finds AI Investment In ANZ Increased Fourfold In 2025
Business leaders and IT decision-makers confirm the accelerating shift toward ROI-driven-AI investments as organisations increase AI spending by 3.3x in AP and 4x in Australia & New Zealand, according to the third edition of Lenovo’s CIO Playbook 2025 - It’s Time for AI-nomics. Commissioned by Lenovo, the research is based on a global IDC study of ...
Rapid7 Announces Global Capability Centre in India
Rapid7 has announced plans for expansion in India, including the opening of a new Global Capability Centre in Pune to serve as an innovation hub and Security Operations Centre. In addition, the company will host a series of in-region events to engage with government, education, and talent stakeholders on Rapid7’s commitment to enable customers to ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
