The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Privacy Has a Business Model Problem

Privacy Has a Business Model Problem

Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
Virus & Malware Scanning Object Storage in OCI

Virus & Malware Scanning Object Storage in OCI

If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem. I just clicked on this link, and my computer is doing something weird. I think my PC has a virus, what do I do? When it’s just a single computer, the answer is simple, ...
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...
Darktrace – Media Roundtable | Event Report

Darktrace – Media Roundtable | Event Report

I was recently invited to a Roundtable Media Event held by Darktrace to unpack the new era of cyber security threats. Held on Thursday 16th June, it was led by Tony Jarvis, Director of Enterprise Security and Dave Palmer, Chief Product Officer. The following is a synopsis of the event and a deeper dive into what was covered.   Most Significant ...
OCI User Access Review Made Easy

OCI User Access Review Made Easy

I’m sure we can all agree, adopting a cloud strategy is awesome. The opportunities and benefits it affords are many. However cloud governance is an ongoing problem that plagues security, compliance, and management teams, which cloud vendors like Oracle are continually trying to solve. If you’re reading this, you’ve probably been asked, or heard at ...
Media Alert: Scammers Hack Twitter Accounts to Steal Popular NFTs and Digital Currencies

Media Alert: Scammers Hack Twitter Accounts to Steal Popular NFTs and Digital Currencies

According to recent research, published by Tenable’s Staff Research Engineer, Satnam Narang, scammers have once again dug deep into their bag of tricks to capitalise on the fervour in non-fungible tokens (NFT) and cryptocurrencies. Many are hijacking verified and unverified accounts on Twitter to impersonate popular NFT projects including Bored Ape ...
Why Renewal of Your Privacy Practice is Critical

Why Renewal of Your Privacy Practice is Critical

It is without doubt that the COVID-19 pandemic forced some of the most significant changes in society, business and workforce practices in the last century. With billions of consumers and workers driven online, businesses adapted and accelerated their digital strategies. As staff worked remotely and scammers capitalised on the explosion of e-commerce, ...
No results found.

In The News

New Research: Almost Half of Australian IT Teams Waste Up to 3-days Per Month Fixing Human Errors, Exposing Organizations to Unnecessary Cyber Risk

New Research: Almost Half of Australian IT Teams Waste Up to 3-days Per Month Fixing Human Errors, Exposing Organizations to Unnecessary Cyber Risk

SYDNEY, Australia, March 4, 2025 – Tanium today released new research highlighting the need for automation to mitigate human error, improve security, and reduce burnout. ‘The Impact of IT Operations Automation on the Morale, Productivity, and Security Posture of IT Teams’ report reveals nearly half of Australian IT teams (43%) are wasting up to 20 ...
A10 Networks Expands its Cybersecurity Portfolio with Acquisition of ThreatX Protect

A10 Networks Expands its Cybersecurity Portfolio with Acquisition of ThreatX Protect

ThreatX Protect Addresses Critical Need to Protect Against Evolving Application and API Security Threats
Hiring Crisis: Surge In AI-generated Resume Causing Aussie Businesses to Miss Out On Top Talent

Hiring Crisis: Surge In AI-generated Resume Causing Aussie Businesses to Miss Out On Top Talent

Hiring crisis: Surge in AI-generated resume causing Aussie businesses to miss out on top talent. Businesses spending almost two working weeks sifting through irrelevant applications for a single role.
Venafi Extends SaaS Machine Identity Security Product Portfolio to Australia

Venafi Extends SaaS Machine Identity Security Product Portfolio to Australia

Venafi, a CyberArk Company, announced today the general availability of its SaaS machine identity security product portfolio, including TLS Protect Cloud, TLS Protect for Kubernetes and Venafi Firefly, in Australia. Hosted and delivered locally within the region via software-as-a-service, Venafi’s machine identity security products will allow ...
Databricks Achieves FedRAMP High Authorization for AWS GovCloud

Databricks Achieves FedRAMP High Authorization for AWS GovCloud

Hires industry veteran Mike Daniels to lead public sector practice amid rapidly growing demand for data intelligence
Veeam Releases Kasten for Kubernetes v7.5 With Enhanced Security and Modern Virtualisation

Veeam Releases Kasten for Kubernetes v7.5 With Enhanced Security and Modern Virtualisation

Veeam announces Veeam Kasten for Kubernetes v7.5, designed to deliver unmatched Kubernetes-native data resilience for enterprises. This latest release improves Kubernetes data protection with significant advancements in scalability, notable improvement in backup and restore times, and features to safeguard against emerging threats and simplify ...
2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises

2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises

The industry’s preeminent source on adversary intelligence exposes a 442% increase in vishing  as GenAI-driven social engineering attacks increase; DPRK insider threats spike
Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550% in 2024

Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550% in 2024

Geopolitics, growing threat surface, and AI-tech drive bigger, longer, more intense attacks
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This