The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Awareness to Action – Building a Culture of Cybersecurity at SMBs
While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still disproportionately exposed. With tighter budgets and fewer dedicated staff, smaller organisations can find it challenging to prioritise cybersecurity alongside other pressing business needs. Therefore as we progress through 2025, the ...

Why Australia Must Shift from Reactive to Resilient Cybersecurity
Recent data highlights that the old playbook of manual threat hunting for organisations is over. Traditional defences are no longer effective and organisations need to expand on the ASD's mandate and adopt a new mindset to build true cyber resilience.

Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience
CISO predictions for 2026 | Artificial intelligence, geopolitics, and the new era of cyber resilience

The Identity Crisis CISOs Can No Longer Ignore
As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it ...

From Boring Storage to Cyber Resilience
Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience.
“We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines
Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...

NetApp’s CEO Unveils New Strategy
Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king.
“Data is the foundation for transforming a business,” Kurian explained.
Having the data and the ...

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore
For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law.
No results found.
In The News
Lenovo Supports Major Sovereign AI Initiative, With Sharon AI’s Melbourne Deployment Of Industry-Leading 1K B200 Cluster
Lenovo is proud to announce its role in delivering a 1,000-GPU NVIDIA B200 cluster for leading Australian Neocloud Sharon AI (NASDAQ:SHAZ), at NEXTDC’s Tier IV M3 data centre in Melbourne. This is Lenovo’s largest-ever TruScaleTM Infrastructure as a Service engagement, marking a significant step in the expansion of sovereign AI infrastructure in ...
NinjaOne Adds Almost 1,000 Healthcare Customers and Drives Nearly 70% Year-Over-Year Revenue Growth
NinjaOne had announced significant momentum in the healthcare sector, with almost a thousand new healthcare customers moving to NinjaOne in the past year and nearly 70% year-over-year growth in healthcare-related annual recurring revenue (ARR). The growth underscores increasing demand from healthcare organisations seeking to improve patient care ...
TrendAI Helps Drive Global Takedown of Tycoon 2FA MFA-bypass Phishing Service
Long-term intelligence tracking and cross-industry coordination disrupt a major identity‑based cybercrime operation
Radware Announces Another DDoS Industry First – Encrypted Attack Blocking Without SSL Decryption
Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the availability of its Web DDoS Protection for Encrypted Traffic as a cloud-based service that does not require SSL certificate sharing or traffic decryption. With this release, Radware believes it is the only security ...
Nord Security Partners with Wavelink to Strengthen Cybersecurity in ANZ
Nord Security, a global cybersecurity powerhouse, today announced a distribution partnership with Wavelink to strengthen channel support for managed service providers (MSPs) and resellers across Australia and New Zealand, helping them better protect small and mid-sized businesses (SMBs) as the cyber threat landscape becomes more sophisticated and ...
Closing the Gender Gap: ESET Launches Fifth Year of Women in Cybersecurity Scholarship in Australia
SYDNEY - March 6, 2026 - Ahead of International Women’s Day on March 8, ESET announced the opening of registrations for the ESET Women in Cybersecurity Scholarship in Australia, inviting eligible female students pursuing IT or cybersecurity degrees to apply and join a global network of women shaping the future of the field. 2026 marks the fifth year ...
Check Point Launches a Secure AI Advisory Service to Help Enterprises Govern and Scale AI Transformation
New service provides a structured governance, regulatory alignment, and risk mitigation to accelerate responsible AI adoption
REDWOOD CITY, CA. March 5, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader in cyber security solutions, today announced a Secure AI Advisory Service, a new service designed to help ...
Bitdefender Uncovers “Vibeware”: A New AI-Driven APT Attack Strategy Flooding South Asia with Polyglot Implants
SYDNEY, 6 March 2026 – Bitdefender have uncovered a new AI-assisted malware development model dubbed “vibeware”, revealing how a Pakistan-aligned threat actor is industrialising cyberattacks across South Asia by rapidly generating large volumes of disposable malware variants.
The activity is linked with medium confidence to APT36, also known as ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
