The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

For The Sake Of Its Cybersecurity, Australia Must Come Together

For The Sake Of Its Cybersecurity, Australia Must Come Together

The Pandemic Has Exacerbated Existing Security Problems As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responses also had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...
Tackling Australia’s Evolving Threat Landscape – Zscaler

Tackling Australia’s Evolving Threat Landscape – Zscaler

The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...
The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...
Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...
Personal Liability in Cyber – What Can We Expect?

Personal Liability in Cyber – What Can We Expect?

The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability.
Absolute Advances New Era of Resilient Zero Trust

Absolute Advances New Era of Resilient Zero Trust

New 451 Research Report Underscores Need for Resiliency in Zero Trust, Achieved via Integrated Endpoint Security, Secure Access, Network Visibility, and Management
New White Paper from ISACA Delves into Risk Tolerance

New White Paper from ISACA Delves into Risk Tolerance

The first step to addressing the myriad types of risk that need to be managed in an organisation is understanding risk appetite and tolerance. ISACA has released two new resources that offer guidance in both areas: the Using Risk Tolerance to Support Enterprise Strategy white paper and Risk Scenarios Toolkit.
Nozomi Networks-Sponsored SANS Survey Finds Security Defences are Getting Stronger as Cyber Threats to OT Environments Remain High

Nozomi Networks-Sponsored SANS Survey Finds Security Defences are Getting Stronger as Cyber Threats to OT Environments Remain High

Nozomi Networks Inc., the leader in operational technology (OT) and IoT security, today announced the SANS 2022 OT/ICS Cybersecurity Report finds industrial control systems (ICS) cybersecurity threats remain high as adversaries set their sights on control system components. In response, organisations have significantly matured their security postures ...
No results found.

In The News

Inside The Russian-Speaking Underground: The Frontline of Global Cybercrime

Inside The Russian-Speaking Underground: The Frontline of Global Cybercrime

Trend Micro’s new research paper highlights cybercriminal underground’s expanding reach 
Found Means Fixed: Reduce Security Debt at Scale With GitHub Security Campaigns

Found Means Fixed: Reduce Security Debt at Scale With GitHub Security Campaigns

Starting today, security campaigns are generally available for all GitHub Advanced Security and GitHub Code Security customers to help them take control of their security debt and manage risk by unlocking collaboration between developers and security teams.
Tenable Commentary: April Patch Tuesday

Tenable Commentary: April Patch Tuesday

Microsoft patched 121 CVEs in its April 2025 Patch Tuesday release, with 11 rated critical and 110 rated as important. Elevation of privilege vulnerabilities accounted for 40.5% of the vulnerabilities patched this month, followed by remote code execution vulnerabilities at 25.6%. CVE-2025-29824, an elevation of privilege bug in Windows Common Log File ...
Fastly Unveils DDoS Attack Insights to Strengthen Protection and Security Transparency

Fastly Unveils DDoS Attack Insights to Strengthen Protection and Security Transparency

New capabilities provide deeper visibility into attack mitigation, helping organisations validate the efficacy of their automated DDoS protection
Sophos Names Chris Bell as Senior Vice President of Global Channel, Alliances and Corporate Development to Lead Next Evolution of Global Channel Strategy

Sophos Names Chris Bell as Senior Vice President of Global Channel, Alliances and Corporate Development to Lead Next Evolution of Global Channel Strategy

Sophos today announced it has named Chris Bell as senior vice president of global channel, alliances and corporate development, where he will lead the evolution of Sophos’ global channel strategy. This key appointment reinforces Sophos’ channel-first commitment to deliver a world-class partner experience. Bell joined Sophos following its acquisition ...
Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

56% of respondents from Australia – higher than the global average (43%) – believe the threat is imminent, disclosing that they have already had to report an act of cyberwarfare. 79% of Australian IT leaders believe that global geopolitical tensions are only worsening the threat. In fact, over half (51%) have experienced more threat activity on their ...
BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

Company recognised for aggressive technical innovation and advanced features that focus on a platform solution, offering broad functionality and use case support Report highlights BeyondTrust’s strengths in securing cloud environments by enforcing least privilege access, identifying identity-based risks, and mitigating misconfigurations 
Kyndryl Expands Partnership With Google Cloud to Accelerate Mainframe Modernisation for Customers With Generative AI

Kyndryl Expands Partnership With Google Cloud to Accelerate Mainframe Modernisation for Customers With Generative AI

Kyndryl certified as a specialised Google Cloud partner for Gemini models
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This