The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Invisible Battlefield: The “Grey Zone” Warfare Threatening Global Stability
Recently, KBI.Media was included in the AUKUS Advanced Technology Dialogue here in Australia across Sydney and Canberra. Some of the dialogue is not allowed to be publicised, but some which can be shared premiered on podcast, KBKast.
Former Deputy Director for Mission Integration at ODNI, Beth Sanner, made clear on an alarming but largely unseen ...

2025 Cybersecurity Predictions By Qualys
Richard Seiersen, Chief Risk Tech Officer at Qualys shares six key predictions for the cybersecurity industry in 2025.

2025 Cybersecurity Predictions by CyberArk
The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. Thomas Fikentscher, CyberArk’s Area Vice President for ...

How Breach Readiness Will Shape Cyber Defense In 2025
Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.

AI Domination and Quantum Computing on the Horizon
Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...

Human-centric Cybersecurity: The First Line of Defence
Introduction
Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago.
And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.
A New Approach
Enter ...
Keeping The Public Safe From Festive Scams
"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers.
One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...

When Post-Quantum Cryptography Is No Longer Post-Quantum
As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
No results found.
In The News
Tenable Research Warns of Critical AI Tool Vulnerability That Requires Immediate Attention [CVE-2025-49596]
Tenable Research has identified a critical remote code execution vulnerability (CVE-2025-49596) in Anthropic's widely adopted MCP Inspector, an open-source tool crucial for AI development. With a CVSS score of 9.4, this flaw leverages default, insecure configurations, leaving organisations exposed by design. MCP Inspector is a popular tool with over ...
S&P 500 fetches Datadog
NASDAQ-listed monitoring and security platform for cloud applications, Datadog, has announced its inclusion on the S&P 500 Index, effective prior to the opening of trading today. The S&P 500 is widely regarded as the best single gauge of large-cap U.S. equities, tracking the stock performance of 500 leading US companies. Datadog’s addition ...
AI-Generated Media Drives Real-World Fraud, Identity Theft, and Business Compromise
Trend Micro uncovers the criminal playbook for deepfake-enabled cybercrime
HID and ASSA ABLOY Recognised with Renowned Red Dot Award for Innovative Biometric eGate Design
Combining an Aesthetically Appealing Design, Function and Innovation, the BG100 Speedgate Sets New Benchmark for Passenger Experience in Air Travel
State of Data Readiness – Report Suggests Large Gap Between Expectation And Reality
A new report released by Commvault has revealed a significant gap between perceived and actual cyber readiness among Australian and New Zealand (ANZ) organisations—raising alarm bells for boards and business leaders across the region.
Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data
Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data
New Solution Protects Against Accidental and Malicious Data Loss, Ensures Business Continuity and Strengthens Cyber Resilience
Cisco Appoints Ben Dawson as New SVP for APJC Sales and APJC President
Singapore, July 9, 2025 – Cisco, the worldwide technology leader, today announced the appointment of Ben Dawson as the new President for its Asia Pacific, Japan and Greater China (APJC) business, succeeding Dave West. He will report to Oliver Tuszik, Executive Vice President of Global Sales and Chief Sales Officer, effective Monday, July 28, ...
Sophos Managed Risk Expands Capabilities with Internal Attack Surface Management (IASM) to Identify and Guide Organisations to Mitigate Internal Vulnerabilities
Expands Visibility of Internal Exposures within an Organisation’s Environment
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..