The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the ...
WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access is Undermining Supply Chains

How Unchecked Third-Party Access is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
No results found.

In The News

Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Provides customers with comprehensive visibility into their Azure environments, enabling automatic remediation, prevention, and optimisation
Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

 Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting organisations: New tools and tactics for the Tycoon 2FA phishing kit Invisible characters that help Cephas kit evade scanners and rules A sophisticated attack involving steganography (image-concealed ...
Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience

Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience

New Kyndryl Consult organisational change management services harness Kyndryl Agentic AI Framework to help enterprises ready their workforces and redefine how work is done
NetApp Fortifies Channel Leadership in APAC, Driven By Robust Partner Program

NetApp Fortifies Channel Leadership in APAC, Driven By Robust Partner Program

NetApp® (NASDAQ: NTAP), the Intelligent Data Infrastructure company, today announced the impact of Partner Sphere, its hallmark partner program that is designed to accelerate partners’ strategic growth and hone their competitive edge and differentiating factor. To ramp up partners’ proficiencies in addressing enterprises’ complex digital transformation ...
Armis Expands Technology Partner Ecosystem to Help Global Organisations Fortify Cyber Defences

Armis Expands Technology Partner Ecosystem to Help Global Organisations Fortify Cyber Defences

Strategic integrations unify cyber capabilities, enhancing joint customers’ existing technology stacks
Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”

Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”

Rapid7’s latest Q3 2025 Threat Landscape Report reveals how cybercriminals are accelerating exploitation timelines, consolidating ransomware alliances, and weaponising AI to outpace defenders.
42% Of Australians Targeted by Job Scams and Nearly One In Three Hit by Financial Fraud Amid Cost-Of-Living Crunch

42% Of Australians Targeted by Job Scams and Nearly One In Three Hit by Financial Fraud Amid Cost-Of-Living Crunch

New Trend Micro research finds half of Australians are under financial strain, with economic stress driving riskier behaviour online
Elastic Redefines Observability with AI-Powered Streams

Elastic Redefines Observability with AI-Powered Streams

Streams presents a unified intelligence layer for extracting structure from messy, unstructured logs, enabling rapid root cause identification and remediation
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This