The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

"It takes years to build trust, but only minutes for a breach to break it." Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...
A CISO’s Love Letter to The Board – Cyber Risk Quantified

A CISO’s Love Letter to The Board – Cyber Risk Quantified

Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...
The New Normal – Ransomware as a Service

The New Normal – Ransomware as a Service

Introduction Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools. In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...
Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.
Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
No results found.

In The News

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered

Trend Micro Predicts 2026 as the Year Scams Become AI-Driven, AI-Scaled, and Emotion-Engineered
Email Threat Radar – December

Email Threat Radar – December

Email Threat Radar – December 2025 Notable threats targeting organisations seen by Barracuda Managed XDR
Dynatrace Expands AWS Integrations at re:Invent 2025

Dynatrace Expands AWS Integrations at re:Invent 2025

BOSTON, Mass., December 3, 2025 — Today at Amazon Web Services (AWS) re:Invent 2025, Dynatrace (NYSE: DT) announced expanded integrations with advanced AWS technologies and new achievements with AWS that deliver enhanced AI-driven observability, automation, and security to customers worldwide. These advancements help enterprises running workloads on ...
Datadog Announces Expanded Collaboration with AWS, Highlighting New AI, Observability and Security Capabilities at AWS re:Invent

Datadog Announces Expanded Collaboration with AWS, Highlighting New AI, Observability and Security Capabilities at AWS re:Invent

Datadog signs new Strategic Collaboration Agreement with AWS, building on 10+ years of joint innovation and outcomes for customers
AI Adoption In Cybersecurity Surges Across Australia: 91 percent Already Using It

AI Adoption In Cybersecurity Surges Across Australia: 91 percent Already Using It

AI now powers detection, response, and recruitment as enterprises shift from reactive to predictive defence
Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience

Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced a bold new chapter in its strategic alliance with HPE. Building on the partnership’s momentum earlier this year, HPE and Veeam are unleashing transformative, integrated solutions designed to empower enterprises with radically simplified data resilience for the ...
BeyondTrust Announces the Availability of BeyondTrust + Ping Identity Unified Identity Security Solutions in AWS Marketplace

BeyondTrust Announces the Availability of BeyondTrust + Ping Identity Unified Identity Security Solutions in AWS Marketplace

ATLANTA, GA – December 03, 2025 –  BeyondTrust, the global leader in privilege-centric identity security protecting Paths to Privilege™, and Ping Identity, a leader in securing digital identities for the world’s largest enterprises, announced today the availability of the BeyondTrust + Ping Identity Unified Identity Security solutions as a ...
Macquarie Telecom Expands Fortinet Partnership to Launch Unified Secure Networking Solution

Macquarie Telecom Expands Fortinet Partnership to Launch Unified Secure Networking Solution

Macquarie Telecom has today announced a major expansion of its long-running partnership with global cybersecurity leader Fortinet. The expansion will see the companies bring a new, fully unified secure networking offering to the Australian market. The strengthened partnership combines Fortinet’s global leadership in secure networking with Macquarie ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This