The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

As Virtual AGM Attendance Soars, How Does Technology Safeguard Against Cyber Threats?
Virtual attendance at Annual General Meetings (AGM) has soared in recent years, providing unheralded levels of engagement, access and accountability. Traditionally, AGMs have been essentially a closed club, limited to only those with the time to visit in person. Today, though, through technology and amendments to the Corporations Act, shareholders and ...
A Third of Australian Organisations Were Breached Over Seven Times in the Past Year
Cyber Risk Index highlights elevated risk as organisations struggle with visibility

‘Cloud engaged’ CEOs are key to Australia’s multi-cloud maturity
New global research from VMware reveals CEO’s link to cloud maturity and related business benefits among companies in Australia and across the region.

Lack of IT Skills Greatest Data Security Challenge Australian Enterprises Face – Rubrik Zero Labs
Rubrik, the Zero Trust Data Security™ Company, today announced the Australian findings from its inaugural State of Data Security report, commissioned by Rubrik and conducted by Wakefield Research. Among the key findings regarding the most pressing challenge Australian cybersecurity leaders face in securing their organisation’s data was “insufficient ...

Progress Survey Reveals Roadblocks to DevSecOps Success in Australia, Shares Factors Driving DevSecOps Evolution for Next Two Years
60% of Australian respondents across 500+-employee organisations admit that they don’t fully understand how security fits into DevSecOps.

Mandiant releases cyber security forecast for 2023
Mandiant’s Cyber Security Forecast 2023 has provided an overview of the cyber security landscape in 2022, and offered forecasts for likely trends in 2023.

A guide to closing the gaps through Penetration Testing
One of the best ways to validate your security controls is through simulated attacks on your systems by authorised ethical hackers, commonly called a Penetration Test. Ethical hackers perform penetration tests using the same techniques and tools as adversaries to identify issues and weaknesses in systems and demonstrate real world business impacts.

For The Sake Of Its Cybersecurity, Australia Must Come Together
The Pandemic Has Exacerbated Existing Security Problems
As the cybersecurity threatscape continues to become more complex and challenging, the media have primarily focused on the struggles faced by businesses. But COVID-19 responses also had the unintended consequence of slowing the rate of incoming professional talent, including security talent, as ...
No results found.
In The News
Veeam Turns Data Protection Into AI Intelligence With New Integration For Anthropic’s MCP
Veeam announced a major leap forward in unlocking the value of enterprise backup data for artificial intelligence (AI). The company unveiled new capabilities that enable AI systems to securely access and utilise data stored in Veeam repositories — powered by support for the Model Context Protocol (MCP), an open standard developed by Anthropic.
This ...
Check Point Software Emerges as a Leader and Only Outperformer Among 14 Vendors in Enterprise Firewalls, According to Latest GigaOm Radar Report
Check Point excels in business criteria assessments, achieving the highest scores from GigaOm for its flexibility, scalability, ease of management, and robust ecosystem
Motorola Solutions Launches SVX and Assist, Converging Two-way Radio With Body Camera and AI Into One Integrated Device for Public Safety
Motorola Solutions has launched SVX, a first-of-its-kind video remote speaker microphone that converges secure voice, video and AI, designed for the company’s flagship radio, APX NEXT. Assist, also launching today, reflects the company’s strategy to put the power of AI into the hands of every first responder in the U.S., underscoring its commitment to ...
Kaseya Unveils Spring 2025 Innovations, Showcasing AI-Driven Innovations Across IT Management and Cybersecurity
Sydney, Australia – 22 April 2025 – Kaseya, the leading global provider of AI-powered cybersecurity and IT management software, has announced its Spring 2025 release with new features that equips MSPs and internal IT teams with new capabilities to automate workflows, enhance the end-user experience, and strengthen security posture ahead of Kaseya ...
Hitachi Vantara Unveils New Virtual Storage Platform One Capabilities to Enable Stronger Cyber Resilience, Performance and Sustainability
Expanded guarantees give enterprises greater control, faster recovery from cyber threats and lower energy costs
Logicalis Expand APAC SOC Services With Launch of Cisco MXDR
Logicalis, a leading provider of global IT solutions and managed services, has announced it is the first partner in Asia Pacific (APAC) to launch Cisco Extended Detection and Response (XDR) as a Global Managed Service (MXDR).
Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself
Today, Microsoft has released its latest Cyber Signals report on AI-assisted scams, including those targeting e-shoppers and job seekers. To read the full report, please click here.
Why is this relevant now? AI-assisted scams are on the rise; over the past year alone, Microsoft has thwarted $US4 billion in fraud attempts and approximately 1.6 ...
Tenable Comment: MITRE CVE Program Funding Set To Expire
MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be catalogued. Please find below a comment from Satnam Narang, sr. staff research engineer at Tenable and a bog here from ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
