The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.
The Role of Data And AI In Cyber Defence

The Role of Data And AI In Cyber Defence

With cyber-attacks are becoming increasingly sophisticated and frequent, there’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from automating threat detection, analysing vast amounts of data for anomalies, and responding to potential breaches in real-time as well as providing a more effective response which ...
Taking A Borderless Approach To Cybersecurity Governance

Taking A Borderless Approach To Cybersecurity Governance

Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all sectors. With attacks becoming more frequent and sophisticated, there’s a compelling need ...
Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices.
Addressing Lateral Movement Threats Against Australian Entities

Addressing Lateral Movement Threats Against Australian Entities

With Australian and international authorities calling out lateral movement incidents multiple times this year, it’s clearly an area where improvements are being urgently sought. A key trend to gain momentum this year was the issuance of multi-country-led advisories outlining the tradecraft of threat groups striking both Australian and allied ...
Top Ten List: Reasons to Use Microsegmentation

Top Ten List: Reasons to Use Microsegmentation

Learn the top 10 reasons to implement microsegmentation in your cybersecurity strategy. Protect against malware, ransomware, and insider threats today.
How SecOps Can Leverage AI And Automation For Faster, Smarter Incident Management

How SecOps Can Leverage AI And Automation For Faster, Smarter Incident Management

Managing modern cyber threats is becoming tougher for security operations (SecOps) teams. Attack surfaces are expanding, and threats are becoming more sophisticated. Fortunately, artificial intelligence (AI) and automation provide the speed, precision, and efficiency that manual methods can no longer match.  Cornelius Mare, chief information security ...
Why Microsegmentation is the Key to Containing Breaches in Today’s Cybersecurity Landscape

Why Microsegmentation is the Key to Containing Breaches in Today’s Cybersecurity Landscape

Discover why microsegmentation is vital for breach readiness. Learn how it prevents lateral movement, protects sensitive data, and ensures business continuity amidst evolving cyber threats.

In The News

Aus3C Calls On Australian Businesses To Help Strengthen The Nation’s Data Protection In Partnership With CSIRO & Australian Government

Aus3C Calls On Australian Businesses To Help Strengthen The Nation’s Data Protection In Partnership With CSIRO & Australian Government

Businesses will help shape part of the Australian cyber ecosystem & voice their opinions at a series of free workshops nationwide or via a research study in February
Qualys Unveils TotalAppSec: New Comprehensive Application Risk Management Solution

Qualys Unveils TotalAppSec: New Comprehensive Application Risk Management Solution

TotalAppSec integrates API security, web application scanning, and AI-driven malware detection into single risk-based approach
Sophos Acquires Secureworks for US$859 million

Sophos Acquires Secureworks for US$859 million

Sophos and Secureworks today announced the completion of Sophos’ acquisition of Secureworks. The all-cash transaction values Secureworks at approximately US$859 million. With the completion of the acquisition, Secureworks’ common stock has ceased trading on Nasdaq. Sophos is backed by Thoma Bravo, a leading software investment firm. With this ...
Salto Systems Bolsters Senior Leadership In Oceania Encompassing Australia

Salto Systems Bolsters Senior Leadership In Oceania Encompassing Australia

Global leaders in access control, Salto, today announces two Oceania senior leadership appointments located in Australia and an Oceania promotion to the wider East Asia remit. This continues Salto’s commitment to fostering local talent, developing its people and driving regional growth. 
SecurityBridge Secures 5,000-Plus SAP Production Systems Amid 80 Percent Growth Surge in 2024

SecurityBridge Secures 5,000-Plus SAP Production Systems Amid 80 Percent Growth Surge in 2024

SecurityBridge concluded 2024 with exponential growth and remarkable achievements, solidifying its position as a leader in SAP cybersecurity.
Semperis Surpasses $100M In ARR As Organisations Prioritise Identity System Defence

Semperis Surpasses $100M In ARR As Organisations Prioritise Identity System Defence

Hybrid Active Directory threat detection and response specialist exceeds 3,000% growth over five years Sydney Australia — 31 January, 2025 — Semperis, a pioneer in identity-driven cyber resilience, today announced it surpassed $100M in annual recurring revenue (ARR), a milestone that fewer than one in every 1,000 venture-backed enterprise software ...
CyberArk Helps Modernise Identity And Access Management For Linux Machines With New Identity Bridge Capability

CyberArk Helps Modernise Identity And Access Management For Linux Machines With New Identity Bridge Capability

CyberArk (NASDAQ: CYBR), the global leader in  identity security, today announced Identity Bridge, an endpoint identity security capability that will support identity and privilege sprawl reduction on Linux machines. Identity Bridge will enable organisations to authenticate to Linux systems using centralised accounts, minimising dependence on outdated ...
Callidus Readies For 3D AI Technology, ESG and Cyber Reporting with Macquarie Telecom

Callidus Readies For 3D AI Technology, ESG and Cyber Reporting with Macquarie Telecom

Macquarie Telecom today announced it has signed a new deal with Callidus Process Solutions to provide Azure public cloud, and data centre services to future-proof its IT and support its expansion into emerging mining markets. Founded and headquartered in Perth, Callidus provides flow control solutions to mining, oil and gas, and new energy ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This