The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australian Energy Sector Grappling with Rising Ransomware Threat
As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.

Eliminating Enterprise Risk: One Phishing-resistant User At a Time
Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...

How to Innovate in a Privacy-Protective Way
Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.

Leading Cybersecurity Tech Trends Driving change
In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.

Layers of Defence Needed to Combat AI-powered Phishing Surge
AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...

Essential Approaches for Securing the Multi-cloud
From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach
The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach
Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
In The News
ColorTokens And Claroty Join Forces To Enhance Cyber-Physical Systems Protection
New Alliance Brings Breach Readiness to Industrial Systems by Combining Unmatched Asset Visibility and Zero Trust Microsegmentation Technologies
SAN JOSE, Calif., November 21, 2024 – ColorTokens Inc., the leading global enterprise microsegmentation company, today announced a new alliance with Claroty, the cyber-physical systems (CPS) protection ...
NetApp Celebrates Partner Excellence At Partner Executive Forum Hayman Island
NetApp Australia & New Zealand announces Partner Awards helping deliver NetApp solutions and services that drive intelligent data infrastructure
SentinelOne Secures Both Known And Shadow AI Services In The Workplace With New AI Security Posture Management
AI-SPM bolsters Singularity Cloud Security portfolio to create visibility into AI services usage, detecting misconfigurations and vulnerabilities in AI applications, and determining potential attack paths
MOUNTAIN VIEW, CA – November 21, 2024 – SentinelOne® (NYSE: S), a global leader in AI-powered cybersecurity, today announced new AI security posture ...
Check Point Software Is A Leader In GigaOm Cloud Radar: Paving The Way In Cloud Security Innovation, Delivering Advanced Threat Prevention And Scalability
Check Point's CloudGuard shines in latest GigaOm CNAPP Radar Report, with superior performance across key cloud security features
Redwood City, CA – November 21, 2024 - – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has been recognised as a Leader and Fast Mover in the latest GigaOm ...
Bitdefender Partners With Cysurance To Provide MDR Customers With A Cybersecurity Breach Warranty Program
Bitdefender today announced a new cybersecurity breach warranty program for businesses that adopt its managed detection and response (MDR) services. The program, which offers up to US$1 million in financial compensation in the wake of security incidents impacting operations, is delivered through a partnership with Cysurance.
“As the threat ...
Elastic Announces AI Ecosystem to Accelerate GenAI Application Development
Elasticsearch vector database integrations with industry-leading AI technology give developers best-in-class resources to expedite the deployment of RAG applications
Check Point Unveils New AI-Powered Network Security Innovations to Raise the Bar on Threat Prevention
New Check Point Quantum Firewall Software R82 delivers new AI engines, post-quantum encryption, accelerated DevOps, with greater simplicity for data centre operations
Trend Micro Platform Enables Partners to Double Impact and Revenue
Attack surface management capabilities drive adoption by small and medium businesses (SMBs) through Managed Service Providers (MSPs).
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..