The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

"It takes years to build trust, but only minutes for a breach to break it." Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...
A CISO’s Love Letter to The Board – Cyber Risk Quantified

A CISO’s Love Letter to The Board – Cyber Risk Quantified

Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...
The New Normal – Ransomware as a Service

The New Normal – Ransomware as a Service

Introduction Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools. In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...
Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.
Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
No results found.

In The News

Quorum Cyber Recognized As A Microsoft Security Excellence Awards Finalist

Quorum Cyber Recognized As A Microsoft Security Excellence Awards Finalist

Quorum Cyber has been named as a finalist in at least two categories at the Microsoft Security Excellence Awards since 2023, showing remarkable consistency in providing the highest standards of service delivery and satisfaction to customers worldwide. This year’s recognition closely follows news, in November 2025, that Quorum Cyber was named as a ...
Veeam partners with ServiceNow to power Data Resilience Processes and Workflows

Veeam partners with ServiceNow to power Data Resilience Processes and Workflows

New Veeam App helps organizations orchestrate and manage data protection for critical assets through ServiceNow, strengthening resilience and compliance Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the Veeam App for ServiceNow, which helps organizations to integrate the management and ...
CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike embraces MITRE’s first real-world cross-domain attack simulation, delivering perfect scores with no false positives AUSTIN, Texas – December 10, 2025 – CrowdStrike (NASDAQ: CRWD) delivered 100% detection and 100% protection with no false positives in the 2025 MITRE ATT&CK® Enterprise Evaluations – the most technically demanding in ...
Wendy Komadina Appointed Darktrace VP ANZ To Spearhead Next Phase Of Partner-Led Growth

Wendy Komadina Appointed Darktrace VP ANZ To Spearhead Next Phase Of Partner-Led Growth

Darktrace is pleased to announce the appointment of highly respected Australian technology executive, Wendy Komadina, as Vice President, Australia and New Zealand (ANZ).
Trend Micro Honours Global Leaders in Cybersecurity with 2025 Global Customer Awards

Trend Micro Honours Global Leaders in Cybersecurity with 2025 Global Customer Awards

Vantage Markets was awarded Customer Innovator for going beyond standard cybersecurity implementations SYDNEY, December 11, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the recipients of its 2025 Trend Global Customer Awards, celebrating organisations worldwide for their corporate leadership, ...
New Research Reveals Australians and New Zealanders are Ready for AI-Powered Emergency Response

New Research Reveals Australians and New Zealanders are Ready for AI-Powered Emergency Response

86% willing to share real-time location data; strong support for AI to detect threats and accelerate response
Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex infection chain. The film, Leonardo DiCaprio's latest, has quickly gained notoriety, making it an attractive lure for cybercriminals seeking to infect as ...
Tenable Patch Tuesday commentary – December 2025

Tenable Patch Tuesday commentary – December 2025

In the last Patch Tuesday for 2025, Microsoft addresses 56 CVEs, including two publicly disclosed vulnerabilities and one zero-day that was exploited in the wild. Elevation of privilege (EoP) vulnerabilities accounted for 50% of the vulnerabilities patched this month, followed by remote code execution (RCE) vulnerabilities at 33.9%. Please find below a ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This