The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why emergency phase planning isn’t enough for secure data management

Why emergency phase planning isn’t enough for secure data management

The federal government recently announced it will form a new agency, the National Office of Cyber Security, which will be led by a new cyber co-ordinator to manage major incidents across government and to liaise with affected companies during the emergency phase. In the past few months, the industry has witnessed the dire need Australian businesses ...
2022 Threat Roundup: The Emergence of Mixed IT/IoT Threats

2022 Threat Roundup: The Emergence of Mixed IT/IoT Threats

Rapid digitisation means that organisations are now more connected than ever. Most organisations now host a combination of interconnected IT, OT, IoT and sometimes IoMT devices in their networks, which has increased their attack surface. Forescout’s data shows that around 24% of connected devices in every organisation are no longer traditional IT. The ...
Qualys Threat Research Unit (TRU) Launches 2023 TruRisk Research Report

Qualys Threat Research Unit (TRU) Launches 2023 TruRisk Research Report

Insights provide data-backed, actionable steps for security teams to decrease risk and increase the resilience of their organisation.
Protecting My Identity and Privacy: Banking Veteran Shocked at How Much Data is Collected

Protecting My Identity and Privacy: Banking Veteran Shocked at How Much Data is Collected

On a recent SBS Insight episode, Anna Borzi, a guest on the segment, speaks candidly about her thoughts towards privacy and her unwillingness to give away her personal details. Anna's experience serves as a reminder of the importance of protecting personal information and the challenges many people face in today’s world.
Finding clarity in the noise: visibility and AI in an age plagued by security threats

Finding clarity in the noise: visibility and AI in an age plagued by security threats

Today’s world demands businesses to improve cybersecurity measures and gain greater visibility over threats and attack surfaces, else fall prey to sophisticated and targeted attacks. The more visibility an organization has, the better equipped to detect and respond in a timely, meaningful way. Luckily, with security of increasing importance, there are ...
Why Security Vulnerability Management Strategies Need to Evolve

Why Security Vulnerability Management Strategies Need to Evolve

The capabilities offered by business software applications are constantly growing, but unfortunately so too are the number of vulnerabilities. Much of this challenge can be attributed to the rate of change that is occurring within organisations. Determined to improve productivity and reduce operational costs, many are embracing strategies of digital ...
Harassment Surged 20x in Ransomware Cases, New Report from Palo Alto Networks Unit 42 Finds

Harassment Surged 20x in Ransomware Cases, New Report from Palo Alto Networks Unit 42 Finds

A new report from Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, found that ransomware and extortion actors are utilising more aggressive tactics to pressure organisations, with harassment being involved 20 times more often than in 2021, according to Unit 42™ incident response cases.
Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler

Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released new research* revealing that while Australian organisations plan to increase cybersecurity budgets in 2023, business leaders hold conflicting views on the function.
No results found.

In The News

Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses

9% of cloud storage resources contain sensitive data, while 54% of organisations have secrets embedded in workloads, exposing critical vulnerabilities
Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities

Bitdefender has announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended detection and response (XDR) platform and managed detection and response (MDR) services. The ...
Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Advances National Security with New Sovereign, Air-Gapped Cloud Offering

Oracle Compute Cloud@Customer Isolated manages classified workloads to support mission success
SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

SentinelOne Teams With AWS To Bring Best In Class Cloud Security Protection To Customers Through The New AWS Security Hub

As an initial launch partner, SentinelOne and AWS gives security teams the data, visibility, and automation to protect their AWS environments from build time to run time  MOUNTAIN VIEW, Calif. — June 17, 2025 — SentinelOne® (NYSE: S), a global leader in AI-powered security, today announced that it is a launch partner for the new AWS Security Hub. The ...
Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability In Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission To At Least 18 Popular Google Projects

Tenable, the exposure management company, has identified a vulnerability in Google’s open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including ChromiumOS (CVE-2025-1568), Chromium, Dart, and Bazel. GerriScary could have allowed attackers to submit ...
Genetec Accelerates NZ Business Momentum with Sektor Partner Appointment

Genetec Accelerates NZ Business Momentum with Sektor Partner Appointment

Auckland/Sydney - 18 June 2025— Genetec Inc. (“Genetec”), a global leader in enterprise physical security software, today announced the appointment of leading technology distributor, Sektor, as its official distribution partner in New Zealand. This collaboration is aimed at accelerating the growth of physical security solutions across large and ...
Secure Code Warrior Unveils Industry-First AI Coding Rulesets To Guide Safer AI Code Deployment

Secure Code Warrior Unveils Industry-First AI Coding Rulesets To Guide Safer AI Code Deployment

Community-driven resource empowers developer teams of all sizes to integrate AI safely into critical workflows SYDNEY – June 18, 2025 - Secure Code Warrior, the leading developer risk management company, today announced the availability of AI Security Rules on GitHub – a first-of-its-kind, free resource to help developers generate more secure code ...
CrowdStrike Falcon For AWS Security Incident Response Strengthens Cyber Resilience For AWS Customers

CrowdStrike Falcon For AWS Security Incident Response Strengthens Cyber Resilience For AWS Customers

New program offers AWS Security Incident Response customers best-in-class Falcon platform protection at preferred rates   AUSTIN, Texas – June 16, 2025 – CrowdStrike (NASDAQ: CRWD) today unveiled Falcon for AWS Security Incident Response at AWS re:Inforce 2025, a new program that provides AWS Security Incident Response customers with ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This