The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security
84% of codebases contained at least one known open source vulnerability, an almost 4% increase from last year’s findings.

Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)
23 Feb 2023 6:00 AM
Dr Samar Fatima, Research Fellow, Enterprise AI and Data Analytics Hub
Topics: Google, Bard, AI, artificial intelligence, ChatGPT
“The race for search engine supremacy is getting fierce amongst tech giants with the release of Open AI’s ChatGPT instilling competitive fear in those bigger companies such as ...

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review
The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by ...

Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure
Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape

The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report
Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk
Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats

Why 2023 is the Year to Implement a Zero-Trust Strategy
Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks.

How to establish a ‘security-aware’ business culture
When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck.
No results found.
In The News
Google Cloud Expands Risk Protection Program to Australia Amid Rising Cyber Threats and Insurance Pressures
Google Cloud today announced the expansion of its Risk Protection Program (RPP) to the Australian market, providing local organisations with a streamlined path to cyber insurance that reflects their real-time security posture. The move comes as Australian companies face rising cyber risks, stricter regulatory standards, and mounting insurance ...
SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel
SAP systems are integral to many organizations, managing critical business processes and sensitive data. However, protecting these systems against cyber threats has traditionally been challenging due to their complexity and the specialized nature of SAP applications.
Elastic Brings Enterprise Data to NVIDIA AI Factories
Elasticsearch integrates with NVIDIA Enterprise AI Factory validated design to fuel AI agents and generative AI applications with real-time intelligence
SecurityBridge to Showcase AI-Powered CVA and Microsoft Sentinel Integration at SAP Sapphire 2025
SecurityBridge will be exhibiting at booth #414, demonstrating the latest innovations in SAP cybersecurity, including its newly released AI-powered Code Vulnerability Analyzer (CVA) and enhanced integration with Microsoft Sentinel.
Elastic Announces General Availability of Elastic Cloud Serverless on Google Cloud Marketplace
Developers building observability, security, and search applications benefit from uncompromised speed and scale
NVIDIA Enterprise AI Factory Integrates CrowdStrike’s Falcon Platform Into Validated Design Architecture
CrowdStrike delivers end-to-end protection for enterprise AI factories built with NVIDIA Enterprise AI Factory validated design architecture
Tenable Powers AI-Driven Exposure Management with Third-Party Data Connectors and Unified Dashboards
Tenable One bridges siloed security tools for faster, smarter, business-aligned security decisions
Cisco Study Reveals Alarming Deficiencies In Security Readiness
Cybersecurity readiness remains alarmingly low as only 3 percent of organisations in Australia have achieved a mature level of readiness.
Organisations continue to struggle with the complexities introduced by AI, with 82% having experienced AI-related security incidents in the last year.
The ongoing shortage of skilled cybersecurity professionals ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
