The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success

Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.
Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...
Resilience Comes From Knowing What to Prioritise

Resilience Comes From Knowing What to Prioritise

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
No results found.

In the News

$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security

$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security

Investing in the People Shaping Open Source and Securing the Future Together See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains. Open source has always been about community. It’s about maintainers who review pull ...
CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike’s Falcon platform extends enterprise-grade cybersecurity to Nebius’s AI cloud platform, supporting high-performance environments built for AI innovators  March 17, 2026 CrowdStrike (NASDAQ: CRWD) and Nebius (NASDAQ: NBIS) today announced a major global partnership to bring the CrowdStrike Falcon® platform to Nebius AI Cloud, extending ...
World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

The Securing AI Lab, built on NVIDIA AI factories within WWT’s AI Proving Ground, provides enterprises a validated path to secure, production-ready AI March 17, 2026 World Wide Technology (WWT) and CrowdStrike (NASDAQ: CRWD) today announced the launch of the Securing AI with CrowdStrike Lab within WWT’s AI Proving Ground. Built on NVIDIA AI ...
HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

Cyber adversaries adopt business-like models to target every major sector, HPE finds Generative AI used to produce synthetic voices, images and videos for targeted impersonation fraud campaigns World-class network threat research expertise and experience brought together in new HPE Threat Labs Sydney, AUSTRALIA – March 18, 2026 – HPE (NYSE: ...
Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

REDWOOD CITY, CA. – March 17, 2026 – Check Point Software Technologies Ltd. (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into CrowdStrike Falcon® Next-Gen SIEM.  The integration allows security teams to ingest and correlate email-based activity with downstream identity ...
Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

An independent global study finds that organisations meeting verified trust criteria achieve 51% higher transaction conversion and 43% lower fraud losses. DENVER, March 17, 2026 – Ping Identity, a leader in securing digital identities for the world's largest enterprises, released independent research showing that organisations that have ...
Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Updates simplify visitor workflows, accelerate daily operations, and expand enterprise hardware support. MONTRÉAL, March 17, 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced new access control enhancements to Security Center SaaS. The updates simplify day-to-day operations for security teams ...
Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Enterprise security veteran to lead regional sales strategy as organisations across APJ strengthen identity-first cybersecurity Key Highlights: The appointment comes as organisations across APJ increase investment in identity security to support cloud adoption, AI initiatives, and evolving cyber risks Lei will oversee customer acquisition, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This