The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why SD-WAN Is Worth the Hype: Transform Your Network
Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...

MyCISO Launches in Style
Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them.
The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...
Security Fatigue: How Public Agencies Can Counter this Silent Menace
Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...

What I’ve Learnt as an Entrepreneur
A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.

What I’ve Learnt as an Entrepreneur
A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.

Australian Public: How to add 2FA
Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...

Privacy Has a Business Model Problem
Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...

Virus & Malware Scanning Object Storage in OCI
If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem.
I just clicked on this link, and my computer is doing something weird. I think my PC has a virus, what do I do?
When it’s just a single computer, the answer is simple, ...
No results found.
In The News
Microsoft Report – Fraudsters Using AI to Supercharge Their Scams – Tips to Protect Yourself
Today, Microsoft has released its latest Cyber Signals report on AI-assisted scams, including those targeting e-shoppers and job seekers. To read the full report, please click here.
Why is this relevant now? AI-assisted scams are on the rise; over the past year alone, Microsoft has thwarted $US4 billion in fraud attempts and approximately 1.6 ...
Tenable Comment: MITRE CVE Program Funding Set To Expire
MITRE’s CVE program has been an important pillar in cybersecurity for over two decades. The lack of certainty surrounding the future of the CVE program creates great uncertainty about how newly discovered vulnerabilities will be catalogued. Please find below a comment from Satnam Narang, sr. staff research engineer at Tenable and a bog here from ...
DDoS Threat Landscape Shifts: U.S. Hit Hardest, but Australia and NZ Remain on Alert
New data from Radware’s Hacktivism Unveiled Q1 2025 report underscores a sharp escalation in politically motivated cyberattacks, particularly Distributed Denial-of-Service (DDoS) campaigns. The United States emerged as the most frequently targeted nation, experiencing 558 attacks—13.5% of all incidents globally—outpacing Ukraine (400) and Israel (340). ...
Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in APJ
Gerry Sillars is Bolstering Semperis’ Identity-Driven Cybersecurity Efforts in Asia Pacific and Japan
Tenable Announces Co-CEOs – Steve Vintz and Mark Thurmond
Tenable®, the exposure management company, today announced that its Board of Directors has unanimously appointed Steve Vintz and Mark Thurmond as Co-Chief Executive Officers on a permanent basis. Following an extensive search process that considered both internal and external candidates, the Board concluded that Vintz and Thurmond are best positioned ...
12th Annual Edition of the BeyondTrust Microsoft Vulnerabilities Report Reveals Record-Breaking Year for Microsoft Vulnerabilities
Total vulnerabilities reached an all-time high of 1,360 in 2024, an 11% increase from the previous record of 1,292 in 2022
Elevation of Privilege (EoP) and Remote Code Execution (RCE)—primary goals of any threat actor looking to exploit a system—continue to dominate the vulnerability categories year-over-year
New Research Reveals Australian Businesses Are Experiencing a Rise In Fraud
61% of Australian respondents have reported increases in the most common types of fraud such as identity theft, account creation fraud and digital document forgeries.
Fuse Partners With Check Point Software to Deploy First Advanced Blockchain Firewall for Real-Time Threat Prevention
Partnership introduces first-of-its-kind, AI-powered threat prevention layer for blockchains—securing smart contracts, wallets in real time
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
