The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Can Cyber Security Be a Platform for Innovation and Growth?
Six Preparedness and Performance Indicators to Unlock Cyber Agility

Digitally Marked: Australia’s Sensitive Position in the Global Cyberwar
Strategic advisor at Semperis, Simon Hodgkinson, discussed the ongoing state-sponsored cyberattacks, particularly in Australia. With decades of experience as a cybersecurity leader in software, financial services, and energy industry, Hodgkinson shared valuable perspectives and reflected on previous incidents, highlighting hard-learned lessons and best ...

Is Shadow AI the New Enemy Labyrinth?
Most Australian companies remain exposed to the round the clock threats, especially those exploiting AI technology. A new survey conducted by Cisco covering 8,000 organisations worldwide, with 301 from Australia unveil a new state of affairs.‘Shadow AI’ as we know it, is the use of unauthorised AI tools by employees, outside the official scrutiny of IT ...

Oracle’s Comeback to the Cloud Arena
Oracle, historically perceived as a late entrant in the cloud services market, and more commonly known for its database capability, is now pedalling a bold new trajectory that could reshape the competitive cloud landscape.
Since April 2024, Oracle has introduced several major updates such as the DR-25 initiative, which effectively shrinks its ...

Cyber Risk is Business Risk: Qualys Calls For Strategic Shift During Global Cybersecurity Week
Sam Salehi, Managing Director ANZ at Qualys discusses why cyber risk can no longer be treated as a siloed IT issue, but must be addressed as a core business priority. As threat actors move faster and leverage AI to amplify attacks, Salehi highlights the urgent need for organisations to adopt a unified, strategic approach—bringing together security, IT, ...

World Password Day – Insight by CyberArk: Passwords Alone Can’t Defend Against Today’s Identity Threats
As the boundaries between our personal and professional lives continue to blur, World Password Day is a timely reminder that this convergence extends to how we manage passwords. The human element remains a well-known challenge for security and identity professionals. With password reuse common across personal and corporate accounts, a single ...
Active Subscription Scam Campaigns Flooding the Internet
Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken to make these fake sites look convincingly legitimate.
Gone are the days when a ...

The Corporate Game Nobody Talks About
Are leaders born, made or just good corporate game players?
Corporate leadership isn’t a clean-cut meritocracy...it can somewhat feel like a gladiatorial arena where only the fittest survive. Industry heavyweight David Gee, Advisor at JS Careers, Bain & Company and Emertel pulls up on what it *really* takes to scale the corporate ladder, ...
No results found.
In The News
SailPoint Research Highlights Rapid AI Agent Adoption, Driving Urgent Need For Evolved Security
SailPoint, Inc. . (Nasdaq: SAIL), a leader in unified identity security for enterprises, today released a new research report titled ‘AI agents: The new attack surface. A global survey of security, IT professionals and executives.’ The report highlights an urgent need for improved identity security as AI agents gain widespread adoption.
69% of Organisations Breached by Ransomware Over Past Year, Delinea Report Finds
AI accelerates both attacks and defences, but critical security gaps persist
SYDNEY, May 29, 2025 - Delinea, a pioneering provider of solutions for securing human and machine identities through centralised authorisation, has unveiled new research highlighting how ransomware attacks have continued to surge over the past year, despite fewer victims ...
Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface
Veriti is the first to introduce pre-emptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments
Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises
AI security solution integrated with NVIDIA Enterprise AI Factory validated design
SYDNEY, MAY 20, 2025 – Global enterprise cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its bringing powerful and simplified security capabilities to NVIDIA Enterprise AI Factory validated design, helping organisations worldwide ...
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel
Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper
ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies
Issued on 22 May 2025, a joint advisory from ASD’s ACSC, CISA, NSA, FBI and more than a dozen allied agencies warning that Russia’s GRU Unit 26165 (APT28/Fancy Bear) has been spying on Western logistics and technology firms supporting aid to Ukraine since 2022, using password-spray and spear-phishing campaigns plus exploits for Outlook, WinRAR, ...
BeyondTrust Recognised as an Overall Leader in KuppingerCole Leadership Compass for Secrets Management
BeyondTrust’s forward-looking approach to securing human and non-human identities earns high marks from analyst firm
Report highlights BeyondTrust’s scalability, native integrations, and developer-friendly approach to secure machine and application secrets
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..