The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Zscaler Study Finds 90% of Global Enterprises are Adopting Zero Trust, Yet Have Not Unlocked the Full Business Potential
Zscaler, Inc. (NASDAQ:
ZS), the leader in cloud security, found that more than 90% of IT leaders who have started their migration to the cloud have implemented, are implementing, or are planning to implement a zero trust security architecture. Supporting the mass migration to zero
trust to secure users and the cloud, more than two thirds (68%) ...

Omdia Identifies Absolute Software as Endpoint Security ‘Vendor to Watch’
Ability to provide Endpoint Resilience, Visibility and Control differentiates Absolute Secure Endpoint product portfolio

How To Manage The Media Spotlight During A Cybersecurity Incident
The recent high profile cybersecurity attacks on Medibank and Optus, as well as several that have garnered less attention has left corporate Australia scrambling. While technical teams are focussing on risks and vulnerabilities, wise organisations are taking a broader view and developing disaster plans for how they are going to communicate with the ...

Security Navigator 2023 shows Cyber Extortion dominates landscape as 40% is malware, attackers target Europe and beyond, and SMEs, manufacturing and the public sector particularly exposed
Orange Cyberdefense, the specialist arm of Orange Group dedicated to cybersecurity, has today launched its annual security research report, the Security Navigator 2023. Amongst other things, this year’s in-depth analysis examined 99,506 potential incidents that were investigated and triaged by our CyberSOC teams, an increase of 5% from the 2022 report. ...

Rapid7 Assesses the ASX 200 Attack Surface
Industrial sector leads all industries in their risk exposure

Are ransomware attacks becoming a cost of doing business in Australia?
It's easy to see why ransomware is such a cash cow for cybercriminals. It’s more efficient and profitable than other cybercrimes and by exploiting our near-total dependence on the internet, bad actors can demand millions of dollars to restore operations. It’s also the worst-kept secret among Australia’s cyber community that businesses have been quietly ...

Let’s stop playing the blame game and start taking more responsibility for cybersecurity
You will know the drill if you work in cybersecurity: something goes wrong, and immediately the recriminations begin. Vendors, customers, consultants and service providers form an orderly circle, face off, and begin blaming and shaming.
We all know deep down that this circular firing squad routine is toxic and counterproductive, but it is an ...

Tenable Research Finds 72% of Organisations Remain Vulnerable to “Nightmare” Log4j Vulnerability
Tenable®, the Exposure Management company, today announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organisations remain vulnerable to the Log4Shell ...
No results found.
In The News
Rapid7 Introduces Intelligence Hub Within Its Command Platform for Threat Intelligence With Curated, Actionable Insights
Rapid7 has released Intelligence Hub, an integrated threat intelligence solution that will provide security teams with meaningful context and actionable insights for accelerated detection and response. It addresses several key challenges faced by security teams, including siloed intelligence platforms, lack of context, and the inability to prioritise ...
Tenable Research Exposes ConfusedComposer, A Privilege Escalation Vulnerability in Google Cloud Platform
ConfusedComposer Exploits Hidden Cloud Service Dependencies
CIOSO Global Partners with Q-Net Security To Advance Hardware-Based Cybersecurity Solutions
This collaboration underscores CIOSO Global's mission to discover and champion innovative approaches to cybersecurity in an ever-evolving threat landscape, which includes AI and quantum computing-driven cyberattacks.
Akamai Research: AI-Powered Applications Drove 51 Billion Web Attacks in Asia Pacific and Japan, Up 73% Year-Over-Year
Australia was the most targeted country by web and API attacks in APJ
Rubrik Appoints Kavitha Mariappan as Chief Transformation Officer
Sydney, April 24, 2025 — Building on a milestone year for the company, Rubrik (NYSE: RBRK) today announced the appointment of Kavitha Mariappan as its Chief Transformation Officer (CTxO). This newly created role is aimed at deepening executive engagement and accelerating cyber resilience outcomes for global enterprises and public sector ...
Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising
Cloud application monitoring and security platform Datadog today released its new report, the State of DevSecOps 2025, which found that only a fraction of critical vulnerabilities are truly worth prioritising.
To better understand the severity of a vulnerability, Datadog developed a prioritisation algorithm that factored in runtime context to its ...
Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR
Bitdefender has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), the industry’s first endpoint security solution to dynamically tailor hardening for each user—ensuring that security configurations align precisely with user-intended privileges and behaviours and continuously adapt ...
Datadog Makes Strategic Acquisition of Metaplane
Datadog has announced it has acquired Metaplane, an end-to-end data observability platform that provides advanced machine learning-powered monitoring and column-level lineage to prevent, detect and resolve data quality issues across a company’s entire data stack.
With the emergence of AI and widespread adoption of platforms like Snowflake and ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
