The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Crisis Leadership in Uncertain Times: Why People, Practice, and Policy Matter Most

Crisis Leadership in Uncertain Times: Why People, Practice, and Policy Matter Most

We live in times like we are always on the edge of a crisis. Whether it is due to public health issues, geopolitical instability, economic volatility, or an increase in sophisticated cyber threats, uncertainty has become our constant companion. Effective leadership in this kind of environment is a fundamental shift not just in our leadership ...
Awareness to Action – Building a Culture of Cybersecurity at SMBs

Awareness to Action – Building a Culture of Cybersecurity at SMBs

While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still disproportionately exposed. With tighter budgets and fewer dedicated staff, smaller organisations can find it challenging to prioritise cybersecurity alongside other pressing business needs. Therefore as we progress through 2025, the ...
Why Australia Must Shift from Reactive to Resilient Cybersecurity

Why Australia Must Shift from Reactive to Resilient Cybersecurity

Recent data highlights that the old playbook of manual threat hunting for organisations is over. Traditional defences are no longer effective and organisations need to expand on the ASD's mandate and adopt a new mindset to build true cyber resilience.
Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience

Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience

CISO predictions for 2026 | Artificial intelligence, geopolitics, and the new era of cyber resilience
The Identity Crisis CISOs Can No Longer Ignore

The Identity Crisis CISOs Can No Longer Ignore

As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it ...
From Boring Storage to Cyber Resilience

From Boring Storage to Cyber Resilience

Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience. “We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...
NetApp’s CEO Unveils New Strategy

NetApp’s CEO Unveils New Strategy

​Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king. “Data is the foundation for transforming a business,” Kurian explained. Having the data and the ...
No results found.

In The News

Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Sydney, 27 January 2026 - Leading technology service provider, Tecala, today announced that the company has achieved two significant security milestones that reinforce its position as one of Australia’s most trusted technology partners. The company has been awarded the Microsoft Solutions Partner Designation for Security and successfully completed ...
Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Recommendations help organisations safeguard sensitive data while maintaining effective security operations
New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic tools aim to fix why security agents fail when data is scattered across dozens of systems
CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 announces the availability of Rapid7 MDR for Microsoft – a pre-emptive threat detection, investigation, and response service that brings together Rapid7’s global SOC, our market-leading SIEM technology, and deeper bi-directional Microsoft Defender integrations.
Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls 
Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This