The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

ExtraHop Report Finds 82% of Australian and New Zealand Organisations Paid up in Ransomware Attacks
Data uncovers correlation between cybersecurity debt and ransomware incidents
Recorded Future Shares Monthly Cyber Vulnerabilities Report to Help Australian Organisations Prioritise Security Measures
Five high risk vulnerabilities from March to watch out for in Microsoft, Adobe, Fortinet, and Samsung

91% of Australian Organisations Find the Execution of Essential Security Operation Tasks Challenging, Sophos Survey Finds
Among these challenges, 71% struggle with Identifying the root causes behind an Incident, leaving them vulnerable to further malicious activity

Wesfarmers OneDigital and AWS Sign Agreement to Transform the Shopping Experience for Aussies
Wesfarmers OneDigital today announced a five-year agreement with Amazon Web Services (AWS) to support the business’s developing data and digital platform to deliver the best value and services for its customers. The new agreement means AWS will be the strategic cloud provider across the Wesfarmers Group.

Australia’s Information Media and Telecoms Industry Under Spotlight as 50 Million Australian Records Lost to Cybercriminals
Flashpoint’s risk landscape report shows percentage of stolen Australian credentials in 2022 increases by 99%

Consumers Threaten to Abandon Businesses That Pollute by Hoarding Unnecessary Data
Nearly half of Australian consumers said they would stop buying from companies wilfully causing environmental damage by failing to control how much unneeded data they are storing.

Palo Alto Networks Global State of Cloud-Native Security Survey Reveals 93% of Australian Organisations Cannot Detect, Contain and Resolve Cyberthreats Within an Hour
Third annual report identifies top security gaps and challenges for organisations operating in the cloud

Survey: 92% of Global Organisations Indicate Identity Security as Critical for a Robust Zero Trust Implementation
CyberArk Introduces Peer-Based Framework for Evaluating and Maturing Identity Security Strategies
No results found.
In the News
Nozomi Networks Labs Report Finds Australia the Fourth Most Targeted Country
The latest Nozomi Networks Labs OT & IoT Security Report released today finds Australia the fourth most targeted country. The report assesses the operational technology (OT) and Internet of Things (IoT) threat landscape to provide insights into how industrial organisations and critical infrastructure are being targeted by cyberattacks. Leveraging a ...
Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform
Tenable One now connects more of the security stack than any other exposure management platform, empowering customers with unmatched context into their cyber exposure
FieldEx Leverages Datadog to Enhance Resilience and Operational Efficiency
Malaysian startup scaled operations and streamlined issue detection and alerting using Datadog’s comprehensive cloud observability platform
Rapid7 Launches Incident Command: AI-Native SIEM Empowers Analysts to Act With Speed and Precision From Risk to Response
Rapid7 has launched Incident Command, a next-gen SIEM built on its Command Platform to transform how security teams detect, investigate, and respond to threats. Powered by SOC-tested Agentic AI, it unifies threat detection, exposure management, automation, and curated threat intelligence in a single interface.
Australian IT Teams Spend a Quarter of Their Week on Outages, yet Report Strong Resilience
New SolarWinds Report Reveals a Gap A Perception Gap, As Many Local IT Teams Struggle With Processes, Staffing, and Technology Readiness
Rapid7 Launches Active Patching, Powered by Automox, to Proactively Mitigate Risk on Vulnerable Assets Across the Entire Attack Surface
Active Patching, a fully automated patching and remediation solution integrated into Rapid7’s Exposure Command solution. Powered by Automox, it empowers security and IT teams to proactively mitigate risk across vulnerable assets.
Extortion Evolves: Akamai SOTI Report Examines the Increasing Complexity of Ransomware Attacks
New report explores the tactics, techniques, and procedures attackers use and the fallout for organisations
Research Identifies Emerging Risks When Businesses Deploy Multiple AI Agents – And How to Start Addressing Them
New report by Gradient Institute equips Australian organisations with tools to better understand risks as AI agents join the digital workforce
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
