The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Hidden Cost of Technology Evolution
Enterprise technology is often defined by speed, new platforms, and better systems. But for Matt Watts, a Data Expert, the space’s obsession with what’s next has created a blind spot. Behind every step forward lies obsolete systems, forgotten data, and unfinished ideas powering on in limbo. As the pace accelerates, so does the urgency to rethink how we ...
From Zero to Stack
Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT environment from scratch. The pair discussed the tools that work, the ones that don’t, and how decisions should be based on people.
The conversation kicked off with a topic that’s top of mind for many: virtualisation in a post-VMware ...

LinkedIn DMs Are Not a Business Continuity Plan
According to recent research conducted by Semperis, there’s a genuine gap between feeling prepared and actually being prepared when an incident hits. And when the lights go out those plans often burn as quickly as the crisis. Courtney Guss, Director of Crisis Response at Semperis, spoke about corporate preparedness or lack thereof. 97% of companies ...

The Countdown to Quantum Has Begun
How New Certificate Lifecycle Standards Are Set to Prepare the Business Landscape for a Quantum Ready Future
Five Telecom Habits of Smart Small Businesses
Introduction
Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on.
Consolidate Where IT Makes Sense
It’s ...

Tool Sprawl a Silent Sabotage?
Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains.
Ask an enterprise security leader what really keeps them up at night, and the answer is rarely that easy, unfortunately. For Rao, the narrative isn’t one of failure, but the evolution.
“We are ...
Rethinking the Office Phone: Why Cloud PBX Is the Future for SMBs
Overview
For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age. Cloud-based PBX (Private Branch Exchange) ...

The Scattered Spider, Airline Attacks and How to Be Breach Ready!
Introduction
On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...
No results found.
In the News
Nord Security Partners With Wavelink to Strengthen Cybersecurity in ANZ
Nord Security, a global cybersecurity powerhouse, today announced a distribution partnership with Wavelink to strengthen channel support for managed service providers (MSPs) and resellers across Australia and New Zealand, helping them better protect small and mid-sized businesses (SMBs) as the cyber threat landscape becomes more sophisticated and ...
Closing the Gender Gap: ESET Launches Fifth Year of Women in Cybersecurity Scholarship in Australia
SYDNEY - March 6, 2026 - Ahead of International Women’s Day on March 8, ESET announced the opening of registrations for the ESET Women in Cybersecurity Scholarship in Australia, inviting eligible female students pursuing IT or cybersecurity degrees to apply and join a global network of women shaping the future of the field. 2026 marks the fifth year ...
Check Point Launches a Secure AI Advisory Service to Help Enterprises Govern and Scale AI Transformation
New service provides a structured governance, regulatory alignment, and risk mitigation to accelerate responsible AI adoption
REDWOOD CITY, CA. March 5, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader in cyber security solutions, today announced a Secure AI Advisory Service, a new service designed to help ...
Bitdefender Uncovers “Vibeware”: A New AI-Driven APT Attack Strategy Flooding South Asia With Polyglot Implants
SYDNEY, 6 March 2026 – Bitdefender have uncovered a new AI-assisted malware development model dubbed “vibeware”, revealing how a Pakistan-aligned threat actor is industrialising cyberattacks across South Asia by rapidly generating large volumes of disposable malware variants.
The activity is linked with medium confidence to APT36, also known as ...
LevelBlue Expands Vulnerability and Exposure Management Capabilities for MSSP and MSP Partners With Tenable
New offerings deliver scalable, Tenable-powered exposure management across the partner ecosystem
March 6, 2026 — LevelBlue, the world’s largest pure-play provider of managed security services, has announced Exposure Management for Partners, featuring expanded vulnerability and exposure management capabilities for managed security service provider ...
Malicious Insider Incidents Rising Faster Than Negligence-based Threats in Australia for the First Time
New study reveals disconnect between security awareness and technical controls, as AI-powered attacks accelerate and collaboration tools expand the attack surface
CrowdStrike Reports Fourth Quarter and Fiscal Year 2026 Financial Results
CrowdStrike Holdings, Inc. (Nasdaq: CRWD), today announced financial results for the fourth quarter and fiscal year 2026, ended January 31, 2026.
"FY26 will go down in our history books as CrowdStrike's best year yet," said George Kurtz, CrowdStrike's Founder and CEO. "We achieved $5.25 billion in ending ARR - the fastest and only pure-play ...
Red Hat, NVIDIA, and Palo Alto Networks Collaborate to Deliver an Integrated, Security-first Foundation for AI-native Telecommunications
Red Hat, the world's leading provider of open source solutions, today announced a collaboration with NVIDIA and Palo Alto Networks to deliver an integrated, security-first foundation for AI-native telecommunications.
AI-driven network operations are increasingly becoming central to how service providers manage network complexity, optimise ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
