The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
Australian Public: How to add 2FA

Australian Public: How to add 2FA

Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...
Privacy Has a Business Model Problem

Privacy Has a Business Model Problem

Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
No results found.

In The News

Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

Gigamon 2025 Survey: 91 Percent Of Security Leaders Are Recalibrating Hybrid Cloud Risk In The AI Era

New research shows AI is driving cybersecurity compromises amid rising data volumes, LLM threats, and growing public cloud concerns
Exabeam And Vectra AI Partner To Accelerate Threat Detection And Simplify Security Operations

Exabeam And Vectra AI Partner To Accelerate Threat Detection And Simplify Security Operations

New integration unifies Exabeam New-Scale Security Operations Platform with Vectra AI’s cutting-edge network detection and response (NDR) to uncover threats that evade traditional tools BROOMFIELD, Colo. & FOSTER CITY, Calif. - May 20, 2025 - Exabeam, a global leader in intelligence and automation that powers security operations, today announced a ...
Palo Alto Networks And Quitch Partner To Make Cyber Training More Engaging, Accessible

Palo Alto Networks And Quitch Partner To Make Cyber Training More Engaging, Accessible

Palo Alto Networks, the world’s leading AI cybersecurity company, and Australian online learning platform Quitch today announced the launch of new interactive cybersecurity training modules on the mobile microlearning app. This initiative aims to make cyber education more engaging and accessible for all, and ultimately, more effective.  Developed ...
New Trustwave Research Finds Alarming Professionalisation Of Threat Actors In Hospitality Sector, Including Dark Web Travel Agencies

New Trustwave Research Finds Alarming Professionalisation Of Threat Actors In Hospitality Sector, Including Dark Web Travel Agencies

Sydney – May 22, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released its latest threat intelligence report, the 2025 Trustwave Risk Radar Report: Hospitality Sector, and two supplemental deep dive reports: How Threat Actors Turn Vulnerabilities into Big Business and A DFIR Case Study in Hospitality. Developed ...
Datadog AI Research Unveils Open-Weights Foundation Model And Observability Benchmark

Datadog AI Research Unveils Open-Weights Foundation Model And Observability Benchmark

Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today unveiled the first two launches from Datadog AI Research, which is tackling cutting-edge research challenges that are firmly rooted in real-world problems within cloud observability and security. Datadog AI Research is actively contributing to the broader ...
New Cyber Threat ‘Hazy Hawk’ Hijacks Major Domains – Are You At Risk?

New Cyber Threat ‘Hazy Hawk’ Hijacks Major Domains – Are You At Risk?

Sydney, Australia, 21 May, 2025 - Subdomain hijacking through abandoned cloud resources is an issue that probably every major organisation has experienced, and these attacks are on the rise. Infoblox Threat Intel has tracked some of this activity to a threat actor, dubbed Hazy Hawk, that uses hijacked domains to conduct large-scale scams and malware ...
F5 Expands Strategic Collaboration With Red Hat to Enable Scalable, Secure Enterprise AI

F5 Expands Strategic Collaboration With Red Hat to Enable Scalable, Secure Enterprise AI

Solutions address key challenges in enterprise AI adoption—enabling secure model serving, scalable data movement, and real-time inference across environments SYDNEY, AUSTRALIA, MAY 21, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, today announced an expanded collaboration with Red Hat, the world’s leading ...
Macquarie Telecom Launches VeloCloud Partner Channel In Landmark Agreement

Macquarie Telecom Launches VeloCloud Partner Channel In Landmark Agreement

Macquarie Telecom today announced it has signed a first-of-its-kind agreement with VeloCloud to provide its SD-WAN technology to managed service providers (MSPs) across Australia.   The initial four-year agreement will be supported by an investment – worth an estimated A$30 million – by Macquarie Telecom, enabling it to offer the best ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This