The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why FinTechs Must Be Wary of First Party Fraud In 2023
First party fraud is not a novel concept or challenge for financial institutions. However, due to a unique blend of market forces and downwards pressures on Australians, it is likely to undergo a significant evolution over the next 12 months.
To successfully manage and mitigate the risks of first party fraud, fintechs need to understand what motivates ...

2023 CyberSecurity Predictions
2022 has certainly been a memorable year when it comes to cybersecurity as it has been propelled into the spotlight with the recent breaches.
In 2023, we will continue to see these types of threats arise as well as new challenges. Here are my top predictions for 2023.

2023 Cybersecurity Predictions
2022 has left its mark, particularly over the last couple of months, as cybersecurity has become a national issue. The recent high-profile breaches have cast a spotlight on the devastating effects of cyber-attacks.
2022 has propelled organisations forward in its own way. In 2023 we will see yet another chapter of cybersecurity threats and challenges, ...
DigiCert Releases Cybersecurity Predictions for 2023 and Beyond
DigiCert experts forecast future threat vectors most likely to effect organisations worldwide in the New Year

Zscaler Study Finds 90% of Global Enterprises are Adopting Zero Trust, Yet Have Not Unlocked the Full Business Potential
Zscaler, Inc. (NASDAQ:
ZS), the leader in cloud security, found that more than 90% of IT leaders who have started their migration to the cloud have implemented, are implementing, or are planning to implement a zero trust security architecture. Supporting the mass migration to zero
trust to secure users and the cloud, more than two thirds (68%) ...

Omdia Identifies Absolute Software as Endpoint Security ‘Vendor to Watch’
Ability to provide Endpoint Resilience, Visibility and Control differentiates Absolute Secure Endpoint product portfolio

How To Manage The Media Spotlight During A Cybersecurity Incident
The recent high profile cybersecurity attacks on Medibank and Optus, as well as several that have garnered less attention has left corporate Australia scrambling. While technical teams are focussing on risks and vulnerabilities, wise organisations are taking a broader view and developing disaster plans for how they are going to communicate with the ...

Security Navigator 2023 shows Cyber Extortion dominates landscape as 40% is malware, attackers target Europe and beyond, and SMEs, manufacturing and the public sector particularly exposed
Orange Cyberdefense, the specialist arm of Orange Group dedicated to cybersecurity, has today launched its annual security research report, the Security Navigator 2023. Amongst other things, this year’s in-depth analysis examined 99,506 potential incidents that were investigated and triaged by our CyberSOC teams, an increase of 5% from the 2022 report. ...
No results found.
In The News
Akamai Firewall for AI Enables Secure AI Applications with Advanced Threat Protection
Akamai’s latest solutions use AI to strengthen security while also protecting businesses from AI-driven threats
Excite Announces $2.8 Million Capital Raise To Accelerate Growth In Cyber Security And Training Initiatives
Excite Managing Director and CEO, Mr Bryan Saba, commented: "The funds will enhance our core capabilities in digital forensics, cyber training, and offensive security whilst directly supporting revenue-generating opportunities already in play. We're building momentum across defence, government and critical infrastructure sectors, and this investment ...
Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)
Tenable Research has published new findings that flip the script on one of the most discussed AI attack vectors. In the blog “MCP Prompt Injection: Not Just for Evil,” Tenable’s Ben Smith demonstrates how techniques resembling prompt injection can be repurposed to audit, log and even firewall Large Language Model (LLM) tool calls running over the ...
Lumify Group Wins Cyber Security Training Business of the Year in 2025 Australian Cyber Awards
Company celebrates further recognition of excellence as two employees named finalists in individual award categories
Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration
Proactive security with AI-powered model built for modern enterprise workloads
Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise
Customers now have a single place to rapidly build, deploy, and orchestrate powerful enterprise agents with complete enterprise context, skills, and governance
Genetec Launches AutoVu Plugin, ALPR Analysis Reports To Speed Up Investigations
ALPR-based forensic searches increase investigator efficiency and provide actionable insights.
New Research Reveals Over Half of Cybersecurity Incidents in Australia Occur Due to Unmanaged Assets
Trend Micro evaluation highlights alarmingly low use of attack surface management tools
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
