The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Benjamin Lamont & Helen Schneider – Australian Federal Police
Watch The Interview
Biography
Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, ...

How to Outsmart Ransomware and Build Resilience Within Your Organisation
Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, ...

The Strategic Transformation of IT: From Cost Center to Business Catalyst
The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average ...

Mick Dunne – Chief Cybersecurity Advisor at Microsoft
Watch The Interview
Biography
Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team bring deep industry experience as former CISOs and CTOs to enable them to work with ...

Leigh Williams – CIO, Brisbane Catholic Education
Watch The Interview
Biography
Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and advocator in digital innovation and education, Leigh has led keynotes and workshops ...

Command Central: Holistic Control Room Design for Today’s Critical Infrastructure
This article highlights the urgent need for modern control rooms as our built environment becomes ever more connected. With renewable energy sources integrating into the grid, autonomous industrial vehicles on the move, and smart city advancements reshaping urban life, control rooms must evolve. Many existing control rooms suffer from cramped layouts, ...

Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats
Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet (SOTI) report delivers practical research around risk management to identify, assess, and ...

Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade
Watch The Interview
Biography
As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about harnessing the power of Open Source, demonstrated through his leadership roles at OpenUK ...
In The News
BT’s Global Fabric Goes Live With Customer Traffic
Debut of Global Fabric Internet, the first connectivity service delivered via BT’s new, transformational network-as-a-service (NaaS) platform, Global Fabric. A growing pipeline of customers, services and features are being added over the coming weeks and months.
CrowdStrike Expands Leadership in Hybrid Identity Protection with Falcon Identity Protection for Microsoft Entra ID
About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
Nozomi Networks Labs Report Finds Wireless Networks Unprotected as Threats to Critical Infrastructure Escalate
SYDNEY AUSTRALIA, February 27, 2025 — The latest Nozomi Networks Labs OT & IoT Security Report released today finds wireless networks woefully unprotected as threat actors continue to gain deep access into critical infrastructure. In the 2nd half of last year, critical infrastructure organisations in the United States saw the highest number of ...
CrowdStrike is the First Cloud-Native Cybersecurity ISV to Exceed $1 Billion in Annual AWS Marketplace Sales
About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
CrowdStrike Falcon® Cloud Security Supported on Oracle Cloud Infrastructure
About CrowdStrike CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® ...
Cisco Expands Partnership with NVIDIA to Accelerate AI Adoption in the Enterprise
Bringing together two of the most utilized networking portfolios, Cisco Silicon One and NVIDIA Spectrum-X, will offer enterprises unmatched flexibility and choice in AI data center investments
Trend Micro Puts Industry Ahead of Cyberattacks with Industry’s First Proactive Cybersecurity AI
New capabilities supercharge proactive risk management, threat modelling, attack path prediction, and actionable insights
Microsoft Extends Partnership with Veeam to Integrate AI Services Into Veeam Products
Veeam® Software, announced an expanded partnership with Microsoft—which includes a Microsoft equity investment in Veeam —to build AI solutions that help customers protect, recover, and unlock more value from their data.
Seventy-seven per cent of the Fortune 500 and 67% of the Global 2000 rely on Veeam to safeguard their data from cyber-attacks, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..