The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Under Attack: Exposing Upscale Hacktivist DDoS Tactics
This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.

Benjamin Lamont & Helen Schneider – Australian Federal Police
Watch The Interview
Biography
Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, ...

How to Outsmart Ransomware and Build Resilience Within Your Organisation
Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, ...

The Strategic Transformation of IT: From Cost Center to Business Catalyst
The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average ...

Mick Dunne – Chief Cybersecurity Advisor at Microsoft
Watch The Interview
Biography
Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team bring deep industry experience as former CISOs and CTOs to enable them to work with ...

Leigh Williams – CIO, Brisbane Catholic Education
Watch The Interview
Biography
Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and advocator in digital innovation and education, Leigh has led keynotes and workshops ...

Command Central: Holistic Control Room Design for Today’s Critical Infrastructure
This article highlights the urgent need for modern control rooms as our built environment becomes ever more connected. With renewable energy sources integrating into the grid, autonomous industrial vehicles on the move, and smart city advancements reshaping urban life, control rooms must evolve. Many existing control rooms suffer from cramped layouts, ...

Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats
Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet (SOTI) report delivers practical research around risk management to identify, assess, and ...
No results found.
In The News
Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience
Cohesity and Semperis today announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical Identity infrastructure, including Microsoft Active Directory assets, from cyberattacks.
ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams
New Capabilities in Log360 Tackle False Positives, Keep Threat Coverage Current, and Enable Scaling With Enterprise Demand
Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships
Cohesity today announced multiple cyber resilience breakthroughs at the company’s Catalyst 1 Data Security Summit, extending its pioneering Five-Step Cyber Resilience Framework to companies and governments. These innovations include unmatched protection for compute, container, storage, and database workloads across the three leading hyperscale clouds, ...
New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages
“To stay ahead of the curve, businesses across Australia and New Zealand need to prioritise reducing tool sprawl and data siloes so engineers can detect and resolve critical issues fast. With high-business impact outages costing up to $3 million per hour in lost revenue, organisations can no longer ignore the costs associated with maintaining the status quo.”
Arctic Wolf Enhances Threat Intelligence Plus to Strengthen Proactive Defense
Sydney, Australia – Arctic Wolf®, a global leader in security operations, today announced enhancements to Arctic Wolf Threat Intelligence Plus, introducing a new capability that allows organisations to deploy a threat feed with the same high-fidelity indicators of compromise (IoCs) used by Arctic Wolf’s AI-powered Security Operations Center (SOC) ...
CyberArk Names Omer Grossman Chief Trust Officer and Head of CYBR Unit; Appoints Ariel Pisetzky as CIO
CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced two executive appointments to strengthen its leadership team and support the company's growth and innovation strategy.
Omer Grossman, who has served as CyberArk's Chief Information Officer since late 2022, has been appointed to the newly created role of Chief Trust ...
Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike
AI-powered Risk-based Patching enables customers to identify, prioritize, and fix the vulnerabilities that matter most through a single unified platform
CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era
System of autonomous agents reason, hunt, and take decisive action across the kill chain, supercharging analyst investigations and threat response
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
