The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

A guide to closing the gaps through Penetration Testing

A guide to closing the gaps through Penetration Testing

One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.
For The Sake Of Its Cybersecurity, Australia Must Come Together

For The Sake Of Its Cybersecurity, Australia Must Come Together

The Pandemic Has Exacerbated Existing Security Problems As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responses also had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...
Tackling Australia’s Evolving Threat Landscape – Zscaler

Tackling Australia’s Evolving Threat Landscape – Zscaler

The pressure is on security leaders as sophisticated state-based hacks threaten government, critical infrastructure, and the private sector...
The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The Air Gap is Dead – It’s Time for Industrial Organisations to Embrace the Cloud

The greatest misconception these days is that critical infrastructure organisations still have an air gap. While they make great sense from a cyber security perspective, the reality is that they are inherently at odds with the need for business-critical connectivity. This is why most businesses have turned to the cloud for the connectivity it provides. ...
Business cyber risks and the humble home network

Business cyber risks and the humble home network

Unsurprisingly the Australian Cyber Security Centre also reported this week that 200,000 home and office routers in Australia are at risk of being exploited. If you perhaps aren't sure what that exploited means in context, imagine a hacker standing behind you 24x7 recording everything you look at and type such as usernames, passwords, credit card ...
Personal Liability in Cyber – What Can We Expect?

Personal Liability in Cyber – What Can We Expect?

The CISO entrusted with the protection of Uber's data was found guilty of failing to effectively protect that data. CISOs now face actual personal accountability.
Absolute Advances New Era of Resilient Zero Trust

Absolute Advances New Era of Resilient Zero Trust

New 451 Research Report Underscores Need for Resiliency in Zero Trust, Achieved via Integrated Endpoint Security, Secure Access, Network Visibility, and Management
New White Paper from ISACA Delves into Risk Tolerance

New White Paper from ISACA Delves into Risk Tolerance

The first step to addressing the myriad types of risk that need to be managed in an organisation is understanding risk appetite and tolerance. ISACA has released two new resources that offer guidance in both areas: the Using Risk Tolerance to Support Enterprise Strategy white paper and Risk Scenarios Toolkit.
No results found.

In The News

Rubrik Annapurna to Enable Secure and Intelligent AI with Google Agentspace

Rubrik Annapurna to Enable Secure and Intelligent AI with Google Agentspace

PALO ALTO, Calif., April 9, 2025 – Rubrik (NYSE: RBRK) today announced that Rubrik Annapurna will explore ways to enable enterprises to securely access and utilise their data for AI-driven applications. With new features that enable Rubrik users to use its capabilities in conjunction with Google Agentspace, Rubrik can support enterprise AI models that ...
Rubrik Introduces New Cyber Resilient Solution with Google Cloud

Rubrik Introduces New Cyber Resilient Solution with Google Cloud

In its ongoing commitment to deliver comprehensive cyber resiliency, Rubrik today announces upcoming capabilities designed to help ensure Google Cloud customers can quickly recover their business from a cyberattack or operational disruption. 
CrowdStrike Wins 2025 Google Cloud Security Partner of the Year Award in the Workload Security Category; Expands Partnership to Secure AI Innovation

CrowdStrike Wins 2025 Google Cloud Security Partner of the Year Award in the Workload Security Category; Expands Partnership to Secure AI Innovation

New capabilities in Falcon® Cloud Security enable end-to-end protection for AI innovation on Google Cloud
Datadog Expands BigQuery Monitoring to Build On Its Google Cloud Observability Capabilities

Datadog Expands BigQuery Monitoring to Build On Its Google Cloud Observability Capabilities

Datadog today at Google Cloud Next highlighted multiple recent product launches, including expanded monitoring capabilities for BigQuery. Datadog’s expanded BigQuery monitoring capabilities, now in preview, help teams view BigQuery usage by user and project to identify those incurring the most spend, pinpoint the long-running queries in those segments ...
Infoblox and Google Cloud Announce Partnership to Deliver Cloud-Native Networking and Security Solutions, Reducing Complexity for Enterprise Customers

Infoblox and Google Cloud Announce Partnership to Deliver Cloud-Native Networking and Security Solutions, Reducing Complexity for Enterprise Customers

Companies join forces to help drive innovation in both networking and security—simplifying operations while delivering more visibility, control and protection. Infoblox Universal DDI™, the only network services solution providing best-of-breed DNS, DHCP and IPAM services, now integrates with Google’s Cloud WAN, to help ensure maximum performance, ...
SolarWinds Expands SaaS Offerings in Asia-Pacific and Japan With New Data Center In Australia

SolarWinds Expands SaaS Offerings in Asia-Pacific and Japan With New Data Center In Australia

The new cloud services expansion delivers improved performance, enhanced residency options, and flexibility for businesses across the APJ region
Tenable Comment on Impact of US Tariffs On Cybersecurity

Tenable Comment on Impact of US Tariffs On Cybersecurity

Tenable Co-CEO and CFO Steve Vintz warns that President Donald Trump's wide-ranging tariffs could unintentionally raise the risk of cyberattacks as adversaries look to retaliate against growing economic pressure. There is a strong correlation between economic sanctions, trade barriers and a rise in cyber threats, particularly targeting critical ...
AI Adoption Accelerates in APAC, But Consumers Struggle with Trust, Security, and Job Displacement Concerns

AI Adoption Accelerates in APAC, But Consumers Struggle with Trust, Security, and Job Displacement Concerns

New F5 research reveals an AI paradox, where APAC consumers are enthusiastic about AI’s potential but remain wary of its risks Building trust through transparency, security, and responsible use is key to driving broader adoption
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This