The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to establish a ‘security-aware’ business culture

How to establish a ‘security-aware’ business culture

When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck.
ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

New Research Highlights Uncertainty Around XDR Definition, Implementation and Resources Needed
More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

More than One Third of Gen Z and Millennials surveyed Admit to Online Stalking

Alarmingly, more than 1 in 5 Aussies surveyed have fallen victim to an online dating/romance scam.
Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief

Research: Australia bumped out of top 10 countries targeted by ransomware – Bitdefender Threat Debrief

Bitdefender have today released their Threat Debrief, examining cyber attacks detected throughout December 2022. The report explores the most prevalent ransomware families, countries experiencing the most ransomware attacks, the most popular Android trojans being used by cyber criminals, and domains being targeted with spoof attacks (where attackers ...
The Collateral Damage of Carpet Bombing – Why All Is Often Nothing

The Collateral Damage of Carpet Bombing – Why All Is Often Nothing

History The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a concentration of high-value and (hopefully) well produced advertising. It was designed to not be ...
NEW FLASHPOINT REPORT SHOWS ROLE OF OPEN-SOURCE INTELLIGENCE IN RUSSIA’S FULL-SCALE INVASION OF UKRAINE

NEW FLASHPOINT REPORT SHOWS ROLE OF OPEN-SOURCE INTELLIGENCE IN RUSSIA’S FULL-SCALE INVASION OF UKRAINE

With the hybrid war approaching the one-year mark, Flashpoint’s comprehensive analysis details ten use cases on the impact of OSINT across cyber, physical, and informational battlefields
3 Data Priorities For Business Leaders This Year

3 Data Priorities For Business Leaders This Year

As we begin 2023, economic uncertainty looms large. Many organisations continue to invest in digital transformation but with rising inflation and global conditions impacting bottom lines, leaders in APAC will have to make intelligent investments in technology that will ensure operational efficiencies, boost resilience, and fortify long-term growth.
Low confidence and lack of understanding of privacy obligations revealed in new study

Low confidence and lack of understanding of privacy obligations revealed in new study

ISACA’s Privacy in Practice 2023 survey report shows only 35 percent of respondents in Australia and New Zealand are confident in their organisation’s ability to ensure data privacy and achieve compliance
No results found.

In The News

Genetec Announces Alignment With ACSC’s Essential Eight Cybersecurity Framework

Genetec Announces Alignment With ACSC’s Essential Eight Cybersecurity Framework

SYDNEY, May 6, 2025—Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced it has been assessed to align with the Australian Cyber Security Centre’s (ACSC) Essential Eight threat mitigation requirements, as verified by CyberCX. Developed in partnership with the Australian Government, the ACSC’s ...
CyberArk Named an Overall Leader in the KuppingerCole Analysts 2025 Leadership Compass for Enterprise Secrets Management

CyberArk Named an Overall Leader in the KuppingerCole Analysts 2025 Leadership Compass for Enterprise Secrets Management

Recognition underscores CyberArk’s market leadership in Machine Identity Security
Akamai Firewall for AI Enables Secure AI Applications with Advanced Threat Protection

Akamai Firewall for AI Enables Secure AI Applications with Advanced Threat Protection

Akamai’s latest solutions use AI to strengthen security while also protecting businesses from AI-driven threats
Excite Announces $2.8 Million Capital Raise To Accelerate Growth In Cyber Security And Training Initiatives

Excite Announces $2.8 Million Capital Raise To Accelerate Growth In Cyber Security And Training Initiatives

Excite Managing Director and CEO, Mr Bryan Saba, commented: "The funds will enhance our core capabilities in digital forensics, cyber training, and offensive security whilst directly supporting revenue-generating opportunities already in play. We're building momentum across defence, government and critical infrastructure sectors, and this investment ...
Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)

Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)

Tenable Research has published new findings that flip the script on one of the most discussed AI attack vectors. In the blog “MCP Prompt Injection: Not Just for Evil,” Tenable’s Ben Smith demonstrates how techniques resembling prompt injection can be repurposed to audit, log and even firewall Large Language Model (LLM) tool calls running over the ...
Lumify Group Wins Cyber Security Training Business of the Year in 2025 Australian Cyber Awards

Lumify Group Wins Cyber Security Training Business of the Year in 2025 Australian Cyber Awards

Company celebrates further recognition of excellence as two employees named finalists in individual award categories
Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration

Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration

Proactive security with AI-powered model built for modern enterprise workloads
Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise

Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise

Customers now have a single place to rapidly build, deploy, and orchestrate powerful enterprise agents with complete enterprise context, skills, and governance
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This