The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Countdown to Quantum Has Begun
How New Certificate Lifecycle Standards Are Set to Prepare the Business Landscape for a Quantum Ready Future
Five Telecom Habits Of Smart Small Businesses
Introduction
Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on.
Consolidate Where It Makes Sense
It’s ...

Tool Sprawl a Silent Sabotage?
Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains.
Ask an enterprise security leader what really keeps them up at night, and the answer is rarely that easy, unfortunately. For Rao, the narrative isn’t one of failure, but the evolution.
“We are ...
Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs
Overview
For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age. Cloud-based PBX (Private Branch Exchange) ...

The Scattered Spider, Airline Attacks and How to Be Breach Ready!
Introduction
On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...

Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts
Summary
Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...

Why Does Recovery Take So Long? But It Doesn’t Have To
Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline.
I sat down ...
NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup
Introduction
Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
No results found.
In The News
BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks
BioCatch, which prevents financial crime by recognising patterns in human behaviour, today announced a major upgrade to its market-leading digital fraud- and financial crime-detection platform. BioCatch Connect 2.0 features both BioCatch Align, a singular, next-generation software development kit (SDK) that unifies signal collection (behaviour, device, ...
Check Point Software Collaborates with Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio
As AI reshapes enterprise workflows, Check Point works with Microsoft to enable secure agent innovation powered by real-time guardrails, DLP, and threat prevention
REDWOOD CITY, CA. November 18, 2025 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is collaborating ...
Rapid7 Delivers Smarter Network Security with Curated Intelligence Rules for AWS Network Firewall
Rapid7's Curated Intelligence Rules for AWS Network Firewall delivers threat intelligence directly into customers’ AWS environments to address the operational challenges security teams face when manually managing and updating firewall rules to keep pace with evolving threats.
Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale
New services address emerging risks as organisations expand agentic AI across mission-critical environments
SYDNEY, November 20, 2025 – Kyndryl (NYSE: KD), a leading provider of mission-critical enterprise technology services, today announced Kyndryl Agentic AI Digital Trust to help enterprises securely manage and scale their agentic AI ...
CyberArk Unveils Free Tool and Powerful TLS Certificate Scan to Help Organisations Tackle Soaring Labor Costs and Disruptive System Outages
Certificate lifespans are shrinking from 398 days today to just 47 days by 2029 | Transitioning to automated renewals will dramatically decrease labor costs | CyberArk’s new tools help organisations understand exposure and calculate renewal impact in seconds
Sophos Recognised with Microsoft Verified Small and Medium Business Solution Status
Sophos has announced its integration with Microsoft Defender for Business, Microsoft Defender for Endpoint, and that its Sophos MDR for Microsoft environments solution has achieved Microsoft verified Small & Medium Business (SMB) solution status through the Microsoft Intelligent Security Association (MISA). Microsoft’s verified SMBSolution status ...
Infoblox Launches Predictive DNS-Based Threat Protection Solution on AWS
Infoblox, the leader in uniting networking, security and cloud with a protective DDI platform, today announced the launch of Infoblox AWS Marketplace managed rules for AWS Network Firewall. This new integration strengthens organisations’ cloud security posture with predictive, DNS-based threat intelligence natively within their existing Amazon Web ...
Veeam Data Platform v13 Launches and Redefines the Standard for Cyber Resilience, Advanced Data Protection, Security and Identity Controls, and AI-Powered Intelligence
Along with new capabilities to outsmart threats and accelerate recovery with next-gen security, forensic insights, and intelligent automation, Veeam is launching the Universal Hypervisor Integration API, a flexible integration platform for hypervisors
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
