The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Bridging AI Readiness in Australia

Bridging AI Readiness in Australia

With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.
Private Satellites, Public Dangers: Be Alarmed!

Private Satellites, Public Dangers: Be Alarmed!

Introduction Can governments and large businesses rely on private Starlink-type networks? In pursuing global connectivity and broader reach, many may overlook the risks associated with private satellite networks. The emergence of private satellite internet networks, led by Starlink and its expanding roster of competitors, has sparked debate about ...
How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025

How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025

Ruma Balasubramanian at Check Point Software Technologies provides advice on fostering an inclusive workplace this International Women's Day 2025.
Compliance In Healthcare is Not a Security Strategy

Compliance In Healthcare is Not a Security Strategy

Australia’s healthcare sector is failing at cybersecurity. The latest MediSecure breach, compromising the data of 12.9 million Australians, isn’t an isolated incident—it’s a symptom of a much larger, systemic problem. The industry’s outdated, compliance-driven approach to security is not working. Without a fundamental shift towards data-centric ...
A Supercharged Security Culture is Needed to Navigate Australia’s Cybersecurity Rules

A Supercharged Security Culture is Needed to Navigate Australia’s Cybersecurity Rules

By focusing on an organisation-wide security culture, CISOs can best prepare to meet burgeoning security requirements. Being able to prove the effectiveness of their program with easy-to-understand scoring is also invaluable in maintaining trust, ongoing budget and funding.
The Feminine Firewall: Securing Cyberspace with Heart and Smarts

The Feminine Firewall: Securing Cyberspace with Heart and Smarts

Introduction Diversity is the art of thinking independently together. In ancient times, women played vital roles far beyond their local communities. From the powerful priestesses of Delphi in ancient Greece to strong leaders like Hatshepsut in Egypt, women were not just keepers of cultural heritage but also catalysts for meaningful change. Their ...
CISOs and the C-Suite: The Start of a Beautiful Relationship?

CISOs and the C-Suite: The Start of a Beautiful Relationship?

Introduction Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at major corporations and government agencies in Australia have dominated headlines, forcing ...
The Role of Secure Information Architecture in Transforming Modern Workspaces

The Role of Secure Information Architecture in Transforming Modern Workspaces

Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation Report, nearly one-third of organisations are dissatisfied with their IT infrastructure.1 ...
No results found.

In The News

Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Veriti is the first to introduce pre-emptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments 
Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

AI security solution integrated with NVIDIA Enterprise AI Factory validated design  SYDNEY, MAY 20, 2025 – Global enterprise cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its bringing powerful and simplified security capabilities to NVIDIA Enterprise AI Factory validated design, helping organisations worldwide ...
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies

Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies

Issued on 22 May 2025, a joint advisory from  ASD’s ACSC, CISA, NSA, FBI and more than a dozen allied agencies warning that Russia’s GRU Unit 26165 (APT28/Fancy Bear) has been spying on Western logistics and technology firms supporting aid to Ukraine since 2022, using password-spray and spear-phishing campaigns plus exploits for Outlook, WinRAR, ...
BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management

BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management

BeyondTrust’s forward-looking approach to securing human and non-human identities earns high marks from analyst firm Report highlights BeyondTrust’s scalability, native integrations, and developer-friendly approach to secure machine and application secrets
APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics

APT28 Escalates Cyber-Espionage Campaign Targeting Ukraine Aid Logistics

A Russian military cyber unit, known as APT28 or "Fancy Bear," has intensified its cyber-espionage efforts against organisations supporting Ukraine, according to a joint advisory issued by the UK's National Cyber Security Centre (NCSC) and allied intelligence agencies including the US and Australia. Operating under Russia’s military intelligence ...
Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

New research shows AI is driving cybersecurity compromises amid rising data volumes, LLM threats, and growing public cloud concerns
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This