The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Cybercriminals Never Take a Day Off

Why Cybercriminals Never Take a Day Off

Cyber criminals don’t take days off. They hit when we’re taking some ‘down time’. Why? Because our guards are down and it’s a perfect time to strike. Gerry Sillars, Vice President of APJ at Semperis discusses the relentless nature of cyber threats and the realities of ransomware attacks, as revealed in Semperis' latest holiday risk report.“Think ...
Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to ...
Are Defenders Prepped for the Next Cyber Chapter?

Are Defenders Prepped for the Next Cyber Chapter?

Securing AI isn’t just about defending against cyber threats - it’s about establishing governance frameworks that ensure AI is used responsibly. With AI adoption accelerating, organisations are needing to align leadership, compliance teams, and IT security to manage risks without stifling innovation. Janice Le, General Manager of Microsoft Security, ...
Zero Trust – The Secret Sauce Behind Breach Readiness

Zero Trust – The Secret Sauce Behind Breach Readiness

Discover how ColorTokens' integrated Zero Trust solution enhances security by unifying Identity Governance, Microsegmentation, and Software-Defined Perimeters.
Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Introduction In the interconnected world of cybersecurity, organisations, nations, and individuals constantly confront strategic decisions regarding resource allocation, information sharing, and defence against cyber threats. One of the most compelling frameworks for analysing these challenges is the Prisoner’s Dilemma, a foundational game theory ...
Generative AI: Striking a Balance between Innovation and Overreliance

Generative AI: Striking a Balance between Innovation and Overreliance

The threats posed by AI are distinct in many ways from those that target user identity, software code, or business data. While traditional cybersecurity risks often focus on protecting specific assets, AI introduces new challenges - such as hallucinations, deepfakes, and ethical concerns - that can impact decision-making and public trust. The key for ...
Bridging AI Readiness in Australia

Bridging AI Readiness in Australia

With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.
Private Satellites, Public Dangers: Be Alarmed!

Private Satellites, Public Dangers: Be Alarmed!

Introduction Can governments and large businesses rely on private Starlink-type networks? In pursuing global connectivity and broader reach, many may overlook the risks associated with private satellite networks. The emergence of private satellite internet networks, led by Starlink and its expanding roster of competitors, has sparked debate about ...
No results found.

In The News

CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management

CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management1. Recognised as a Leader for the seventh consecutive time, CyberArk is positioned furthest in Completeness of Vision which, from the company's standpoint, reflects CyberArk's ...
Semperis Announces Midnight In The War Room: A Groundbreaking Cyberwar Documentary Featuring The World’s Leading Defenders And Reformed Hackers

Semperis Announces Midnight In The War Room: A Groundbreaking Cyberwar Documentary Featuring The World’s Leading Defenders And Reformed Hackers

The first-of-its-kind feature film delves into the high-stakes conflict between cyber attackers and defenders, revealing untold stories of CISOs - their heroism, resilience, and the human cost of cyber war.
Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365

Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365

SYDNEY, Australia - 16 October 2025 - An emerging, stealthy and persistent phishing-as-a-service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users, according to new research from Barracuda. Barracuda threat analysts have been tracking the new and rapidly evolving PhaaS since July 2025 and have named it Whisper ...
Trend Micro Named a Leader in Network Analysis and Visibility

Trend Micro Named a Leader in Network Analysis and Visibility

SYDNEY, October 16, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) announced today that it has been named a Leader in Network Analysis and Visibility (NAV) solutions by Forrester. The analyst firm’s independent market evaluation scores the flagship Trend Vision One™ platform highest among all 12 evaluated solutions in the “current offering” ...
Banking scams up 65% globally in last year

Banking scams up 65% globally in last year

SMS text-based phishing (smishing) surges by a factor of 10
ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation

ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation

Enhancements to Qualys ETM platform with integrated remediation help predict and prevent emerging threats to enable provable risk reduction for organisations
Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection

Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection

Bitdefender today announced the worldwide availability of GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) as a standalone solution, making its groundbreaking pre-emptive security technology available to all organisations regardless of their existing endpoint protection (EPP) or endpoint detection and response (EDR) platforms they ...
NetApp Transforms Enterprise Cloud with Google Cloud

NetApp Transforms Enterprise Cloud with Google Cloud

Flexible and powerful block storage now available in Google Cloud NetApp Volumes, along with even greater AI integration for enterprise transformation
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This