The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Role of Secure Information Architecture in Transforming Modern Workspaces
Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation Report, nearly one-third of organisations are dissatisfied with their IT infrastructure.1 ...

Same, Same But Not Different.
The first few weeks of the year signals the back to work influx, in many cases now also a return to the office, from the suburbs to the city. For the vast majority, even in 2025, it means back to the same desk and view surrounded by the same people who most likely did the same things during the 2025 Summer as they did during 2024 or any other summer ...

Building ExeQuantum: The Challenges of Innovating in a Market That Doesn’t Know It’s at Risk Yet
As the CEO of ExeQuantum, I spend my days immersed in the world of post-quantum cryptography (PQC), a space that feels both ahead of its time and painfully urgent. The irony is clear, while the quantum threat is rapidly approaching, most industries still treat security as an afterthought, something to worry about later. The frustrating part? "Later" ...

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms
Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.

What’s New in Microsegmentation in 2025
Know what microsegmentation vendors are offering in 2025 to boost zero trust strategies and counter advanced cyber threats.

The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future
The convergence of Quantum Computing, AI, Blockchain, and Cybersecurity is redefining the technological landscape. These interconnected innovations are revolutionizing industries and reshaping digital trust, security, and efficiency. Understanding their relationships is crucial for future preparedness.

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft
Watch The Interview
Biography
Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was ...

Under Attack: Exposing Upscale Hacktivist DDoS Tactics
This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.
In The News
Databricks Achieves FedRAMP High Authorization for AWS GovCloud
Hires industry veteran Mike Daniels to lead public sector practice amid rapidly growing demand for data intelligence
Veeam Releases Kasten for Kubernetes v7.5 With Enhanced Security and Modern Virtualisation
Veeam announces Veeam Kasten for Kubernetes v7.5, designed to deliver unmatched Kubernetes-native data resilience for enterprises. This latest release improves Kubernetes data protection with significant advancements in scalability, notable improvement in backup and restore times, and features to safeguard against emerging threats and simplify ...
2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises
The industry’s preeminent source on adversary intelligence exposes a 442% increase in vishing as GenAI-driven social engineering attacks increase; DPRK insider threats spike
Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550% in 2024
Geopolitics, growing threat surface, and AI-tech drive bigger, longer, more intense attacks
F5 Unveils Industry’s First Converged Application Delivery and Security Platform for the Hybrid Multicloud Infrastructures of the AI Era
F5 Application Delivery and Security Platform converges high-performance traffic management and advanced security capabilities.
New solutions further enhance F5 platform with capabilities that reduce complexity, simplify operations, and strengthen security for every app.
New Trustwave Research Highlights Cybersecurity Vulnerabilities In Manufacturing
February 27, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the manufacturing sector. As manufacturers increasingly integrate digital systems and physical infrastructure, the sector has become a prime target for cybercriminals aiming to disrupt production, ...
Arctic Wolf Threat Report: 96 Percent of Ransomware Cases Included Data Theft as Cybercriminals Double Down on Extortion
Arctic Wolf®, a global leader in security operations, today released its annual Arctic Wolf Threat Report, offering an in-depth analysis of the evolving cyber threat landscape. This year’s findings underscore how cybercriminals are adapting their methods to bypass stronger security defenses—prioritising data theft, refining business email compromise ...
BeyondTrust Pathfinder Delivers a One-Platform Approach to Identity-Centric Security
Unified platform empowers customers to break free from fragmented, siloed solutions that leave organisations vulnerable to identity threats, and to benefit from adaptive, intelligent, and risk-aware identity security
Fully integrated, AI-driven, identity security platform unifies visualisation, management, and governance of identities, entitlements, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..