The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter This Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
Australian Public: How to Add 2FA

Australian Public: How to Add 2FA

Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...
Privacy Has a Business Model Problem

Privacy Has a Business Model Problem

Business growth should not come at the expense of customer privacy. Unfortunately, that’s not a belief that everybody holds, and the result is an environment in which data privacy breaches are increasing in regularity and severity. Whether it’s Facebook, Cambridge Analytica and The US Elections, or any of the nearly 1,000 incidents received by Office ...
Virus & Malware Scanning Object Storage in OCI

Virus & Malware Scanning Object Storage in OCI

If you’re like me, then working in IT means you also assume Tech Support duties for friends, family, and those distant relatives that only seem to call when they’ve got a problem. I just clicked on this link, and my computer is doing something weird. I think my PC has a virus, what do I do? When it’s just a single computer, the answer is simple, ...

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware ...
No results found.

In the News

Protecting Customers From Octo Tempest Attacks Across Multiple Industries

Protecting Customers From Octo Tempest Attacks Across Multiple Industries

In recent weeks, Microsoft has observed Octo Tempest, also known as Scattered Spider, impacting the airlines sector, following previous activity impacting retail, food services, hospitality organizations, and insurance between April and July 2025. This aligns with Octo Tempest’s typical patterns of concentrating on one industry for several weeks or ...
JFrog Enables AI-Driven Developer Workflows With Robust MCP Server

JFrog Enables AI-Driven Developer Workflows With Robust MCP Server

JFrog’s Model Context Protocol (MCP) server allows developers to seamlessly employ AI-agents across the JFrog Platform, enabling faster, more reliable, secure software development & delivery at scale
Figma Deepens Local Roots in Australia With Local Data Hosting and More

Figma Deepens Local Roots in Australia With Local Data Hosting and More

Figma introduces new governance features for enterprise customers, with local data residency expected later this year.
ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship

ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship

The scholarship is part of ESET’s broader commitment to closing the gender gap in cybersecurity, an industry that remains disproportionately male, despite growing awareness of the need for diverse perspectives. With an estimated 5,000 additional cybersecurity professionals needed each year to meet national targets, programs like this play a vital role ...
Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities Through AI Innovation

Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities Through AI Innovation

Seasoned technologist and former Trigo CTO to lead Check Point’s global cyber security and AI strategy and AI centres
ROLLER Achieves 60% Cloud Savings and Improved Reliability With DataDog

ROLLER Achieves 60% Cloud Savings and Improved Reliability With DataDog

Sydney, Australia – July 22, 2025 – Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today announced ROLLER, an Australian-founded software company for attractions, has streamlined operations, improved availability, and reduced cloud infrastructure costs using the Datadog platform. ROLLER is the software ...
BioCatch Delivers Scams360 to Help Banks Advance Detection of Emerging Scam Types

BioCatch Delivers Scams360 to Help Banks Advance Detection of Emerging Scam Types

Single, streamlined platform defends against full spectrum of scams
Check Point Software Infinity Global Services Earns CREST Accreditation for Penetration Testing, Setting a New Standard in Cyber Security Testing Excellence

Check Point Software Infinity Global Services Earns CREST Accreditation for Penetration Testing, Setting a New Standard in Cyber Security Testing Excellence

Accreditation affirms Check Point’s commitment to high-assurance, ethical and globally validated penetration testing services
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This