The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the ...
WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
No results found.

In The News

CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management

CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management1. Recognised as a Leader for the seventh consecutive time, CyberArk is positioned furthest in Completeness of Vision which, from the company's standpoint, reflects CyberArk's ...
Semperis Announces Midnight In The War Room: A Groundbreaking Cyberwar Documentary Featuring The World’s Leading Defenders And Reformed Hackers

Semperis Announces Midnight In The War Room: A Groundbreaking Cyberwar Documentary Featuring The World’s Leading Defenders And Reformed Hackers

The first-of-its-kind feature film delves into the high-stakes conflict between cyber attackers and defenders, revealing untold stories of CISOs - their heroism, resilience, and the human cost of cyber war.
Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365

Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365

SYDNEY, Australia - 16 October 2025 - An emerging, stealthy and persistent phishing-as-a-service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users, according to new research from Barracuda. Barracuda threat analysts have been tracking the new and rapidly evolving PhaaS since July 2025 and have named it Whisper ...
Trend Micro Named a Leader in Network Analysis and Visibility

Trend Micro Named a Leader in Network Analysis and Visibility

SYDNEY, October 16, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) announced today that it has been named a Leader in Network Analysis and Visibility (NAV) solutions by Forrester. The analyst firm’s independent market evaluation scores the flagship Trend Vision One™ platform highest among all 12 evaluated solutions in the “current offering” ...
Banking scams up 65% globally in last year

Banking scams up 65% globally in last year

SMS text-based phishing (smishing) surges by a factor of 10
ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation

ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation

Enhancements to Qualys ETM platform with integrated remediation help predict and prevent emerging threats to enable provable risk reduction for organisations
Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection

Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection

Bitdefender today announced the worldwide availability of GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) as a standalone solution, making its groundbreaking pre-emptive security technology available to all organisations regardless of their existing endpoint protection (EPP) or endpoint detection and response (EDR) platforms they ...
NetApp Transforms Enterprise Cloud with Google Cloud

NetApp Transforms Enterprise Cloud with Google Cloud

Flexible and powerful block storage now available in Google Cloud NetApp Volumes, along with even greater AI integration for enterprise transformation
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This