The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why an Effective Security Strategy Requires Three Pillars

Why an Effective Security Strategy Requires Three Pillars

The cybersecurity strategies followed by many organisations tend to be rather piecemeal affairs. Multiple products are deployed to tackle different threats with little thought given to creating a cohesive whole. Such an approach is concerning for a number of reasons. It makes effective management difficult to achieve because IT teams need to monitor ...
AIIA Urges Government To Reconsider Increases In Data Breach Penalties

AIIA Urges Government To Reconsider Increases In Data Breach Penalties

AIIA urges Government to reconsider increases in data breach penalties as part of wider Privacy Act review: penalties regime needs to not discourage good behaviour. Australia's peak body for innovation technology, the Australian Information Industry Association (AIIA), is calling on the Albanese Government to take a positive, collaborative approach ...
As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?

As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?

Virtual attendance at Annual General Meetings (AGM) has soared in recent years, providing unheralded levels of engagement, access and accountability. Traditionally, AGMs have been essentially a closed club, limited to only those with the time to visit in person. Today, though, through technology and amendments to the Corporations Act, shareholders and ...

A Third of Australian Organisations Were Breached Over Seven Times in the Past Year

Cyber Risk Index highlights elevated risk as organisations struggle with visibility
‘Cloud engaged’ CEOs are key to Australia’s multi-cloud maturity

‘Cloud engaged’ CEOs are key to Australia’s multi-cloud maturity

New global research from VMware reveals CEO’s link to cloud maturity and related business benefits among companies in Australia and across the region.
Lack of IT Skills Greatest Data Security Challenge Australian Enterprises Face – Rubrik Zero Labs

Lack of IT Skills Greatest Data Security Challenge Australian Enterprises Face – Rubrik Zero Labs

Rubrik, the Zero Trust Data Security™ Company, today announced the Australian findings from its inaugural State of Data Security report, commissioned by Rubrik and conducted by Wakefield Research. Among the key findings regarding the most pressing challenge Australian cybersecurity leaders face in securing their organisation’s data was “insufficient ...
Progress Survey Reveals Roadblocks to DevSecOps Success in Australia, Shares Factors Driving DevSecOps Evolution for Next Two Years

Progress Survey Reveals Roadblocks to DevSecOps Success in Australia, Shares Factors Driving DevSecOps Evolution for Next Two Years

60% of Australian respondents across 500+-employee organisations admit that they don’t fully understand how security fits into DevSecOps.
Mandiant releases cyber security forecast for 2023

Mandiant releases cyber security forecast for 2023

Mandiant’s Cyber Security Forecast 2023 has provided an overview of the cyber security landscape in 2022, and offered forecasts for likely trends in 2023.
No results found.

In The News

Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic, the Search AI Company, announced today that it has received two 2025 Google Cloud Partner of the Year Awards in the Artificial Intelligence category for Data Management & AI and Tooling.    Elastic is being recognised for its achievements in the Google Cloud ecosystem, helping joint customers simplify the process of developing and ...
Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Benchmarking shows Elasticsearch runs up to 40% faster on Google Axion Processor C4A
Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

SREs can now monitor, analyse and optimise the performance of AI deployments using models from Vertex AI
CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

Platform delivers the industry's most comprehensive protection for all non-human identities that matter Combines the application of unique and universal identities to all workloads with secrets management, reducing machine identity complexity and risk New discovery capabilities to provide contextual understanding of workload identity risk
Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping’s partner-first investments reinforce commitment to delivering exceptional experiences for partners and customers
CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

Millions of autonomous, unpredictable AI agents represent new, rapidly expanding identity security attack surface New CyberArk end-to-end solution will help secure AI agents' privileged access across entire environment Delivered through the CyberArk Identity Security Platform, securing all identities - human, machine, and AI - in one place.
Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Study shows Fastly provides enhanced security, improved user experiences, and significant cost savings
New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

Other key findings show an increase in crypto miner detections, a spike in zero-day malware, a drop in endpoint malware, a rise in Linux-based threats, and more.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This