The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Tool Sprawl a Silent Sabotage?

Tool Sprawl a Silent Sabotage?

Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains. Ask an enterprise security leader what really keeps them up at night, and the answer is rarely that easy, unfortunately. For Rao, the narrative isn’t one of failure, but the evolution. “We are ...
Rethinking the Office Phone: Why Cloud PBX Is the Future for SMBs

Rethinking the Office Phone: Why Cloud PBX Is the Future for SMBs

Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age.  Cloud-based PBX (Private Branch Exchange) ...
The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...
Enough With the Optics: It Is Time for Cyber Accountability, Not Publicity Stunts

Enough With the Optics: It Is Time for Cyber Accountability, Not Publicity Stunts

Summary Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...
Why Does Recovery Take so Long? But It Doesn’t Have To

Why Does Recovery Take so Long? But It Doesn’t Have To

Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline. I sat down ...
NBN or Mobile Broadband? How to Choose the Right Business Internet Setup

NBN or Mobile Broadband? How to Choose the Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
Alleged Russian Hackers Target Norwegian Dam

Alleged Russian Hackers Target Norwegian Dam

Why this cyber attack on a Norwegian dam should have you paying attention
How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
No results found.

In the News

Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

The latest Dragos 2026 OT/ICS Cybersecurity Report finds cyber adversaries are progressing from reconnaissance to real-world operational disruption, including across Asia-Pacific.
Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

AI-Driven Attacks, Identity Abuse and Supply Chain Exploitation Reshape the Cyber Threat Landscape
Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

New insights reveal the pivot to data-only extortion, attacker abuse of remote access tools, and how early detection is reshaping ransomware outcomes
New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

Sydney, 18 February 2026 - Dynatrace, the leading AI-powered observability platform, has today released the regional findings of The Pulse of Agentic AI 2026. The inaugural survey of 919 senior global leaders responsible for agentic AI implementation reveals that enterprises are not stalling because they doubt AI, but because they cannot yet ...
Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Analyst firm highlights Check Point’s prevention‑first architecture, strong ecosystem integrations, unified cloud security platform, and continued pace of innovation REDWOOD CITY, CA. February 17, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been ...
LummaStealer Is Back at Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

LummaStealer Is Back at Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

Bitdefender researchers have identified a significant resurgence of one of the world’s most prolific information-stealing malware operations, less than a year after a major global law enforcement action disrupted more than 2,300 of its command-and-control domains. Despite the 2025 takedown effort, LummaStealer was not dismantled. Instead, the ...
Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Technology Group (ASX: MAQ) has announced Kate Vidgen will join the Company’s board as an Independent Non-executive Director following the release of the Company’s FY26 half-year results. Kate will bring more than 30 years’ experience to the company as a senior finance executive and non-executive director with a demonstrated history of ...
Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Policy as code capability transforms compliance in regulated agentic AI workflows | Automated policy enforcement establishes guardrails, codifies compliance and boosts transparency across enterprise operations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This