The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Zero To Stack

From Zero To Stack

 Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT environment from scratch. The pair discussed the tools that work, the ones that don’t, and how decisions should be based on people. The conversation kicked off with a topic that’s top of mind for many: virtualisation in a post-VMware ...
LinkedIn DMs are not a Business Continuity Plan

LinkedIn DMs are not a Business Continuity Plan

According to recent research conducted by Semperis, there’s a genuine gap between feeling prepared and actually being prepared when an incident hits. And when the lights go out those plans often burn as quickly as the crisis. Courtney Guss, Director of Crisis Response at Semperis, spoke about corporate preparedness or lack thereof. 97% of companies ...
The Countdown to Quantum Has Begun

The Countdown to Quantum Has Begun

How New Certificate Lifecycle Standards Are Set to Prepare the Business Landscape for a Quantum Ready Future
Five Telecom Habits Of Smart Small Businesses

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s ...
Tool Sprawl a Silent Sabotage?

Tool Sprawl a Silent Sabotage?

Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains. Ask an enterprise security leader what really keeps them up at night, and the answer is rarely that easy, unfortunately. For Rao, the narrative isn’t one of failure, but the evolution. “We are ...
Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs

Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs

Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age.  Cloud-based PBX (Private Branch Exchange) ...
The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...
Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Summary Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...
No results found.

In The News

BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

Combined solution automates identity decisions across human and non-human identities, strengthening Zero Trust security | Joint offering eliminates identity silos by integrating PAM, IAM, and IGA into a cohesive, AI-driven framework for enhanced visibility, control and governance
Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell (NASDAQ: HON) has been selected by Fitzroy River Water, part of Rockhampton Regional Council, to modernise and automate key water treatment facilities, as part of the Council’s long-term infrastructure improvement program. Rockhampton, located in Central Queensland, relies on Fitzroy River Water to deliver essential water and sewerage ...
Genetec Releases 2026 Global State of Physical Security Report

Genetec Releases 2026 Global State of Physical Security Report

Survey of more than 7,300 professionals reveals: Physical security has evolved into a strategic business function, strengthening IT collaboration and decision-making | Interest in adopting AI more than doubled among end users since last year | Organisations want flexibility to deploy workloads on premises, in the cloud, or in a hybrid model
NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne recently announced NinjaOne Remote®, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, reliable, and secure control over endpoints, wherever they are. The solution is built on a ...
Australia Leads the World in Organisational Concern over Identity Driven Attacks

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Rubrik Zero Labs Issues Latest Study “Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats”
Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda Research Introduces GhostFrame – A Super Stealthy New Phishing Kit Behind a Million Attacks

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility. This is the first time Barracuda has seen an entire phishing framework built around the iframe technique. Threat analysts have been tracking the new PhaaS ...
Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Manufacturing Industry Blocks More Ransomware Attempts, While Adversaries Shift to Data Theft

Sophos has announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. As a result, more than half ...
Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

Darktrace Releases New Innovations in Darktrace / EMAIL™ to Stop Emerging Cross-Domain Attacks and Protect Outbound Trust

New research finds approximately 17% of email threats bypass Secure Email Gateways but are stopped by Darktrace’s AI[1]  New enhancements strengthen protection against threats that move across channels, like email bombing campaigns, as the volume of these attacks surges 100x  New brand verification capabilities introduced as phishing attacks ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This