The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Awareness to Action – Building a Culture of Cybersecurity at SMBs

Awareness to Action – Building a Culture of Cybersecurity at SMBs

While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still disproportionately exposed. With tighter budgets and fewer dedicated staff, smaller organisations can find it challenging to prioritise cybersecurity alongside other pressing business needs. Therefore as we progress through 2025, the ...
Why Australia Must Shift from Reactive to Resilient Cybersecurity

Why Australia Must Shift from Reactive to Resilient Cybersecurity

Recent data highlights that the old playbook of manual threat hunting for organisations is over. Traditional defences are no longer effective and organisations need to expand on the ASD's mandate and adopt a new mindset to build true cyber resilience.
Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience

Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience

CISO predictions for 2026 | Artificial intelligence, geopolitics, and the new era of cyber resilience
The Identity Crisis CISOs Can No Longer Ignore

The Identity Crisis CISOs Can No Longer Ignore

As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it ...
From Boring Storage to Cyber Resilience

From Boring Storage to Cyber Resilience

Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience. “We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...
NetApp’s CEO Unveils New Strategy

NetApp’s CEO Unveils New Strategy

​Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king. “Data is the foundation for transforming a business,” Kurian explained. Having the data and the ...
Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law.
No results found.

In The News

DigiCert Forecasts the Security Priorities Poised to Define 2026 

DigiCert Forecasts the Security Priorities Poised to Define 2026 

From AI to quantum, eight tech predictions that show what organisations must brace for next year
NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne recently announced that it has been recognised as a Leader in two IDC MarketScape reports: Worldwide Unified Endpoint Management Software for Small and Medium Businesses (doc # US53003425, December 2025) Worldwide Client Endpoint Management Software for Windows Device Management (doc # US53002925, December 2025) NinjaOne was also ...
Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Innovation Partnership Award highlights deep collaboration, real-time intelligence sharing, and advanced security deployment across one of Australia’s leading financial trading platforms
The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

New Infoblox Threat Intel research finds that over 90 per cent of visits to parked domains now redirect users to malicious content, reversing a decade old risk profile.
Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Study shows verified brand identities in email protect consumers from phishing while driving higher engagement and brand credibility during peak online shopping season and beyond
Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Collaboration integrates firewalling, segmentation, and policy enforcement directly into NVIDIA BlueField-accelerated infrastructure for higher performance, stronger isolation, and simpler operations
Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated cybercriminal collective, and Mustang Panda, which Sophos X-Ops tracks ...
Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across telecommunications, cloud, cybersecurity, and data centres. Clifton, who after nearly 15 years in senior leadership, including more than a decade leading Macquarie Telecom, has ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This