The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Countdown to Quantum Has Begun

The Countdown to Quantum Has Begun

How New Certificate Lifecycle Standards Are Set to Prepare the Business Landscape for a Quantum Ready Future
Five Telecom Habits of Smart Small Businesses

Five Telecom Habits of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where IT Makes Sense It’s ...
Tool Sprawl a Silent Sabotage?

Tool Sprawl a Silent Sabotage?

Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains. Ask an enterprise security leader what really keeps them up at night, and the answer is rarely that easy, unfortunately. For Rao, the narrative isn’t one of failure, but the evolution. “We are ...
Rethinking the Office Phone: Why Cloud PBX Is the Future for SMBs

Rethinking the Office Phone: Why Cloud PBX Is the Future for SMBs

Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age.  Cloud-based PBX (Private Branch Exchange) ...
The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...
Enough With the Optics: IT Is Time for Cyber Accountability, Not Publicity Stunts

Enough With the Optics: IT Is Time for Cyber Accountability, Not Publicity Stunts

Summary Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...
Why Does Recovery Take so Long? But IT Doesn’t Have To

Why Does Recovery Take so Long? But IT Doesn’t Have To

Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline. I sat down ...
NBN or Mobile broadband? How to Choose the Right Business Internet Setup

NBN or Mobile broadband? How to Choose the Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
No results found.

In the News

CrowdStrike FalconID Extends Risk-Aware Identity Security to Multi-Factor Authentication

CrowdStrike FalconID Extends Risk-Aware Identity Security to Multi-Factor Authentication

CrowdStrike today announced the general availability of FalconID, extending the Falcon® platform with zero-friction, phishing-resistant MFA. Identity is the front line of modern attacks, and this release advances CrowdStrike’s Next-Gen Identity Security leadership with real-time, risk-aware protection against AI-accelerated phishing attacks and ...
F5 Labs Sets New Standard for AI Security Benchmarking With Model Risk Leaderboards and Threat Intelligence

F5 Labs Sets New Standard for AI Security Benchmarking With Model Risk Leaderboards and Threat Intelligence

Comprehensive AI Security Index and Agentic Resistance Score metrics help organisations stress-test security performance of AI systems, from pilot to production
VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

At VAST Forward 2026, VAST Data, the AI Operating System company, and CrowdStrike (NASDAQ: CRWD) announced a strategic partnership that combines VAST’s native data-layer governance and platform-level controls with CrowdStrike’s enterprise-grade threat detection and automated response. By integrating these capabilities within the VAST AI Operating ...
BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust’s Pathfinder platform earns Leader distinction in Innovation / Platform Play quadrant GigaOm highlights BeyondTrust’s AI-driven analytics, just-in-time access, lifecycle governance, and multicloud compliance capabilities  Atlanta, GA – February 26, 2026 — BeyondTrust, the global leader in privilege-centric identity security protecting ...
Genetec Sets a New Standard for Enterprise Physical Security With Cloudlink 2210

Genetec Sets a New Standard for Enterprise Physical Security With Cloudlink 2210

New high-density appliance enables enterprises to scale cloud-managed physical security without forcing cloud-only storage or infrastructure replacement Sydney, 2 March 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced Genetec Cloudlink™ 2210. Designed for complex, enterprise-scale ...
Macquarie Technology Delivers Twenty-two Consecutive Halves of EBITDA Growth

Macquarie Technology Delivers Twenty-two Consecutive Halves of EBITDA Growth

Macquarie Technology Group Ltd (ASX: MAQ) (the Company) today announced its results for the half-year ended 31 December 2025, which were in line with guidance. Chairman Peter James said, “Macquarie Technology Group is pleased to announce its 22nd consecutive half of EBITDA growth. The Company continues to grow and evolve and sees ongoing opportunities ...
VAST Data Introduces Polaris to Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Environments

VAST Data Introduces Polaris to Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Environments

At VAST Forward 2026, AI operating system VAST Data announced Polaris, a global control plane designed to provision, operate and orchestrate distributed AI infrastructure across public cloud, neocloud and on-premises datacentre environments. Polaris transforms VAST deployments into a unified, fleet-scale platform, enabling enterprises to manage AI data ...
New Phishing Campaigns Weaponise Reserved Domain Name Space  

New Phishing Campaigns Weaponise Reserved Domain Name Space  

New research from Infoblox Threat Intel shows how criminals twist a core part of the internet to slip past many of today’s standard security checks. Phishing attacks are everywhere, but historically, their tactics follow clear patterns and trends. Research by Infoblox Threat Intel uncovers an anomaly – a new method utilised by cybercriminals to ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This