The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating Hybrid Cloud Security In the AI Era As Regulations Tighten

Navigating Hybrid Cloud Security In the AI Era As Regulations Tighten

Introduction As hybrid cloud infrastructures continue to evolve, they are increasingly subject to AI-driven risks, complex data environments, and growing cyberthreats. Our recent 2025 Hybrid Cloud Security Survey underscores the rising pressure faced by organisations worldwide as AI technologies disrupt traditional security frameworks. With a 17 ...
From Chaos to Command: Secure Communications at Scale for Public Safety

From Chaos to Command: Secure Communications at Scale for Public Safety

Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response - leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap” emerges: the critical distance between information being available and that same information ...
Securing Australian Organisations in the Quantum Era

Securing Australian Organisations in the Quantum Era

Australian organisations are under-prepared for the cybersecurity threat of quantum and should take these steps to minimise disruption as the technology takes hold.
Deepfakes are Spiralling Out of Control, But How Far Will It Go?

Deepfakes are Spiralling Out of Control, But How Far Will It Go?

David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us. “Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...
The Hidden Costs To Consider When Selecting A Cyber Security Vendor

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

"It takes years to build trust, but only minutes for a breach to break it." Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...
A CISO’s Love Letter to The Board – Cyber Risk Quantified

A CISO’s Love Letter to The Board – Cyber Risk Quantified

Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...
The New Normal – Ransomware as a Service

The New Normal – Ransomware as a Service

Introduction Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools. In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...
No results found.

In The News

Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary

Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKSTORM malware. WARP PANDA exhibits a high level of technical sophistication, advanced operations security (OPSEC) skills, and extensive knowledge of cloud ...
Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Email Threat Radar – December

Email Threat Radar – December

Email Threat Radar – December 2025 Notable threats targeting organisations seen by Barracuda Managed XDR
Dynatrace Expands AWS Integrations at re:Invent 2025

Dynatrace Expands AWS Integrations at re:Invent 2025

BOSTON, Mass., December 3, 2025 — Today at Amazon Web Services (AWS) re:Invent 2025, Dynatrace (NYSE: DT) announced expanded integrations with advanced AWS technologies and new achievements with AWS that deliver enhanced AI-driven observability, automation, and security to customers worldwide. These advancements help enterprises running workloads on ...
Datadog Announces Expanded Collaboration with AWS, Highlighting New AI, Observability and Security Capabilities at AWS re:Invent

Datadog Announces Expanded Collaboration with AWS, Highlighting New AI, Observability and Security Capabilities at AWS re:Invent

Datadog signs new Strategic Collaboration Agreement with AWS, building on 10+ years of joint innovation and outcomes for customers
AI Adoption In Cybersecurity Surges Across Australia: 91 percent Already Using It

AI Adoption In Cybersecurity Surges Across Australia: 91 percent Already Using It

AI now powers detection, response, and recruitment as enterprises shift from reactive to predictive defence
Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience

Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced a bold new chapter in its strategic alliance with HPE. Building on the partnership’s momentum earlier this year, HPE and Veeam are unleashing transformative, integrated solutions designed to empower enterprises with radically simplified data resilience for the ...
BeyondTrust Announces the Availability of BeyondTrust + Ping Identity Unified Identity Security Solutions in AWS Marketplace

BeyondTrust Announces the Availability of BeyondTrust + Ping Identity Unified Identity Security Solutions in AWS Marketplace

ATLANTA, GA – December 03, 2025 –  BeyondTrust, the global leader in privilege-centric identity security protecting Paths to Privilege™, and Ping Identity, a leader in securing digital identities for the world’s largest enterprises, announced today the availability of the BeyondTrust + Ping Identity Unified Identity Security solutions as a ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This