The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Securing Australian Organisations in the Quantum Era
Australian organisations are under-prepared for the cybersecurity threat of quantum and should take these steps to minimise disruption as the technology takes hold.

Deepfakes Are Spiralling out of Control, but How Far Will IT Go?
David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us.
“Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...

The Hidden Costs to Consider When Selecting a Cyber Security Vendor
Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?
"It takes years to build trust, but only minutes for a breach to break it."
Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...

A CISO’s Love Letter to the Board – Cyber Risk Quantified
Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...

The New Normal – Ransomware as a Service
Introduction
Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools.
In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...

Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success
Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.

Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat
Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
No results found.
In the News
Exabeam Expands Award-Winning Exabeam APEX Partner Program With New MSSP Commercial Framework
Flexible, pooled licensing model purpose-built to help managed security providers scale faster and grow predictably
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development
New AI Software Governance solution makes AI-generated code visible at commit, enforces policy before production, and connects real development behaviour to measurable risk reduction
Synechron Unifies Australian Firms Chamonix IT, Exposé and iGreenData Under Company’s Brand
Leading global firm appoints Scott Grigg as country managing director to build Australian consulting business
$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security
Investing in the People Shaping Open Source and Securing the Future Together
See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains.
Open source has always been about community.
It’s about maintainers who review pull ...
CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure
CrowdStrike’s Falcon platform extends enterprise-grade cybersecurity to Nebius’s AI cloud platform, supporting high-performance environments built for AI innovators
March 17, 2026
CrowdStrike (NASDAQ: CRWD) and Nebius (NASDAQ: NBIS) today announced a major global partnership to bring the CrowdStrike Falcon® platform to Nebius AI Cloud, extending ...
World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground
The Securing AI Lab, built on NVIDIA AI factories within WWT’s AI Proving Ground, provides enterprises a validated path to secure, production-ready AI
March 17, 2026
World Wide Technology (WWT) and CrowdStrike (NASDAQ: CRWD) today announced the launch of the Securing AI with CrowdStrike Lab within WWT’s AI Proving Ground. Built on NVIDIA AI ...
HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks
Cyber adversaries adopt business-like models to target every major sector, HPE finds
Generative AI used to produce synthetic voices, images and videos for targeted impersonation fraud campaigns
World-class network threat research expertise and experience brought together in new HPE Threat Labs
Sydney, AUSTRALIA – March 18, 2026 – HPE (NYSE: ...
Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM
REDWOOD CITY, CA. – March 17, 2026 – Check Point Software Technologies Ltd. (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into CrowdStrike Falcon® Next-Gen SIEM.
The integration allows security teams to ingest and correlate email-based activity with downstream identity ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
