The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk
Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in.

The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.
As quantum computing advances, the conversation around post-quantum cryptography (PQC) has largely focused on mitigating security risks. However, this transition brings more than just enhanced protection - it unlocks new opportunities for businesses and industries worldwide. This article explores how the shift away from one-size-fits-all cryptography, ...

Quantum Computing – The Next Frontier
Are we there yet with quantum computing? Paddy McGuinness, former UK Deputy National Security Advisor and current Senior Advisor at Brunswick Group, brings insights into the quantum conversation from leading national resilience and cyber security in the UK to his current advisory role. McGuinness reflected on his tenure in government service, focusing ...

Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era
Gary Savarino, Identity Strategist for APAC at SailPoint shares his recommendations for businesses to adopt a unified identity security approach to safeguard data.

Why API Security Is Crucial To Australia’s Financial Services Industry
Australia’s banking and financial services sector is undergoing a rapid digital transformation amidst a growing consumer appetite for convenient, fast and secure interactions and the emergence of open banking. A report by the Australian Banking Association revealed that 98.9% of bank transactions now take place digitally.
This shift to digitisation ...

The 2024 Ransomware Landscape: Looking Back On Another Painful Year
The ransomware landscape in 2024 showed increased activity and sophistication, with 75 active groups and a median ransom payment of USD $200,000. Top actors like RansomHub and Akira exploited vulnerabilities and adopted double/triple extortion tactics. Over 5,900 leak site posts highlight the scale of attacks, yet actual numbers are likely higher due ...

Better Collaboration Between Public and Private Sector
Toby Jones, Founder of TJC, speaks on the often misunderstood convergence between government and industry. The complexities and opportunities that arise when public and private sectors work together towards collective national security and defence. The convergence between government and industry, though seemingly fraught with challenges, is ...

Unmasking the Digital Puppet Masters
In a world where the line between truth and deception blurs with every click, the silent warriors of the digital realm rise to combat an unseen enemy. Malcolm Purcell, Vice President of APAC at Fivecast, unravels the tangled web of open-source intelligence (OSINT) and its pivotal role in upholding national security.The Digital Haystack: Easier Said ...
No results found.
In The News
Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools
29 April 2025: Logicalis, the leading global technology service provider, has revealed that chief information officers (CIOs) are struggling to derive value from security investments amid an expanding threat landscape according to its annual CIO Report. Logicalis surveyed 1,000 global IT leaders, including more than 300 from Asia Pacific (APAC), ...
BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™
Complimentary new assessment--powered by Identity Security Insights--provides actionable recommendations to secure against vulnerabilities and help organisations tackle identity threats
New assessment quickly reveals hidden Paths to Privilege, employing AI-based detection, and provides an initial set of prioritised findings to help guide security decisions
Palo Alto Networks Cortex XSIAM Delivers Industry’s First AI-Driven SecOps Platform to Span Proactive and Reactive Security
Evolves industry-leading capabilities with AI-driven Cortex Exposure management and Advanced Email Security
CrowdStrike Delivers Industry-First Managed Threat Hunting Across Third-Party Data
Falcon Adversary OverWatch now hunts across third-party data in Falcon Next-Gen SIEM, extending expert-driven detection across every attack surface to stop stealthy adversaries
ColorTokens Highlighted Among Top Providers of Microsegmentation Technology by Industry Experts, Paving the Way for Continued Success in 2025
ColorTokens Announces Key Achievements and Industry Accolades in 2025; Named “Visionary Vendor” by EMA, Recognized as Leader by GigaOm, and Awarded Four Globee Cybersecurity Awards.
Cisco Continues to Drive Innovation to Reimagine Security for the AI Era
New Cisco innovations address the complexities for security professionals to embrace the AI era in today’s dynamic threat landscape
Cisco XDR and Splunk Security advancements simplify threat detection and response with cutting edge agentic AI
Cisco and ServiceNow deepen partnership to ensure customers can efficiently adopt and scale AI ...
Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale
Cisco and ServiceNow deepen partnership to ensure customers can adopt and scale AI securely and efficiently.
Companies will bring portfolios closer together to help enterprises evolve their organizations as they embrace AI.
First planned integration will tackle AI security and risk with Cisco AI Defense and ServiceNow’s Security Operations ...
Qualys Unveils Policy Audit with Enhanced Efficiency for Continuous Audit Readiness
Enhancements streamline evidence collection, prioritise risk-based remediation, and ensure continuous audit readiness, helping organisations reduce compliance costs and regulatory exposure
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..