The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Deepfakes are Spiralling Out of Control, But How Far Will It Go?
David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us.
“Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...

The Hidden Costs To Consider When Selecting A Cyber Security Vendor
Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?
"It takes years to build trust, but only minutes for a breach to break it."
Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...

A CISO’s Love Letter to The Board – Cyber Risk Quantified
Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...

The New Normal – Ransomware as a Service
Introduction
Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools.
In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success
Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat
Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.

IT-OT Convergence: What Happens When Two Worlds Collide?
Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational.
Recently on the DevSecOops podcast, hosts ...
No results found.
In The News
CrowdStrike Advances Next-Gen SIEM and Cloud Security Access on AWS with Streamlined Onboarding, Flexible Pricing, and Cost-Efficient Data Access
CrowdStrike becomes the first cybersecurity partner to deliver an enhanced version of SaaS Quick Launch in AWS Marketplace for fully integrated Falcon Next-Gen SIEM; CrowdStrike Falcon Next-Gen SIEM and Falcon Cloud Security are available on a pay-as-you-go basis for new AWS customers
Jemena Strengthens Security Across Critical Infrastructure Sites Nationwide With Genetec Security Center
Sydney, 2 December 2025 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, has announced that Jemena, a $12.4 billion company that owns and manages some of Australia's most significant gas and electricity assets has deployed Genetec™ Security Center to bolster security across its critical infrastructure sites ...
Intel Appoints Glen Boatwright as Country Manager for Australia and New Zealand
Sydney, Australia, December 1, 2025: Intel today announced the appointment of Glen Boatwright as Country Manager for Australia and New Zealand (ANZ), effective immediately. Glen transitions into this role from his previous position as Regional Sales Manager, where he oversaw HPI and HPE relationships.
Glen brings more than 22 years of experience at ...
Macquarie Technology Group Welcomes ATA’s Change In Constitution to Appoint Telecoms Company Leaders to Board
Macquarie Technology Group has welcomed the Australian Telecommunications Alliance’s (ATA) decision to change its constitution so that only telecommunications company leaders can be appointed to the Board. The decisions sees Macquarie’s own Group Executive Luke Clifton join the Board, bringing decades of technological and customer experience ...

CloudSEK Detects Over 2,000 Holiday-Themed Fake Stores Exploiting Black Friday and Festive Sales
Bengaluru, India – November 27, 2025 – As millions of shoppers gear up for Black Friday and the holiday shopping season, CloudSEK, a global leader in AI-driven digital risk protection, has uncovered an alarming rise in fake online stores.
The investigation reveals over 2,000 fraudulent holiday-themed e-commerce sites designed to exploit consumer ...
Trend Micro Predicts 2026 as the Year Cybercrime Becomes Fully Industrialised
SYDNEY, November 27, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released its annual Security Predictions Report for 2026, warning that the coming year will mark the true industrialisation of cybercrime. Artificial intelligence (AI) and automation are now enabling threat actors to run entire campaigns ...
Australia’s Boards Embrace AI, But Governance Gaps are Widening, New Diligent Survey Reveals
Australian Organisations Balance AI Adoption with Risk Management, as Cybersecurity Emerges as a Top Priority
Datadog’s 2025 State of Cloud Security Report Reveals Increased Data Perimeters Adoption Amid Growing Credential Theft Concerns
Although data perimeters are considered an advanced practice, over one-third of organisations have already adopted them
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
