The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Claroty 2025 Cyber Security Predictions

Claroty 2025 Cyber Security Predictions

The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an ...
AI Ethics: Developing AI models with intent, transparency and diversity

AI Ethics: Developing AI models with intent, transparency and diversity

As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a laundry list of ethical concerns.
Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.
The Role of Data And AI In Cyber Defence

The Role of Data And AI In Cyber Defence

With cyber-attacks are becoming increasingly sophisticated and frequent, there’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from automating threat detection, analysing vast amounts of data for anomalies, and responding to potential breaches in real-time as well as providing a more effective response which ...
Taking A Borderless Approach To Cybersecurity Governance

Taking A Borderless Approach To Cybersecurity Governance

Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all sectors. With attacks becoming more frequent and sophisticated, there’s a compelling need ...
Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices.
Addressing Lateral Movement Threats Against Australian Entities

Addressing Lateral Movement Threats Against Australian Entities

With Australian and international authorities calling out lateral movement incidents multiple times this year, it’s clearly an area where improvements are being urgently sought. A key trend to gain momentum this year was the issuance of multi-country-led advisories outlining the tradecraft of threat groups striking both Australian and allied ...
Top Ten List: Reasons to Use Microsegmentation

Top Ten List: Reasons to Use Microsegmentation

Learn the top 10 reasons to implement microsegmentation in your cybersecurity strategy. Protect against malware, ransomware, and insider threats today.
No results found.

In The News

Tenable Finds AI Workloads Driving New Cloud Security Challenges

Tenable Finds AI Workloads Driving New Cloud Security Challenges

Cloud AI workloads riskier than traditional with 70% containing critical vulnerabilities compared to 50% in non-AI workloads
Excite Cyber Provides Essential Tips to Medical Specialists to Bolster Their Cybersecurity Defences Following Leaking of Patient Data On the Dark Web

Excite Cyber Provides Essential Tips to Medical Specialists to Bolster Their Cybersecurity Defences Following Leaking of Patient Data On the Dark Web

“Hospitals may have stronger defences, but attackers know the weak link often lies in the smaller, less protected third-party medical providers. Medical professionals running small or private clinics should urgently review their cybersecurity protections and enhance them.  
Wavelink Enters New Zealand Market With Strategic Local Investment and Leadership Appointment

Wavelink Enters New Zealand Market With Strategic Local Investment and Leadership Appointment

July 01, 2025 – Wavelink, an Infinigate Group company and leader in technology distribution, services, and business development in Australia and New Zealand (ANZ), has officially launched operations in the New Zealand market. As part of this strategic expansion, the company has appointed Danny Meadows as regional manager, New Zealand. This marks a ...
OVHcloud Partners With Crayon to Deliver Transformative, Cost-effective Technology Solutions Across the World

OVHcloud Partners With Crayon to Deliver Transformative, Cost-effective Technology Solutions Across the World

Sydney – June 30th 2025 – OVHcloud, a global cloud player and the European Cloud leader, today announced a partnership agreement with Crayon, a global leader in innovation and IT services. The agreement enables organisations to access and build in more than 45 regions* including Australia, on the cost-effective, secure and powerful cloud ...
New Trustwave Research On Technology Sector Exposes Escalating Cyber Threats, Dark Web Supply Chain Attacks, AI-Driven Risks

New Trustwave Research On Technology Sector Exposes Escalating Cyber Threats, Dark Web Supply Chain Attacks, AI-Driven Risks

June 26, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports that give an unprecedented look into the evolving threat landscape targeting technology organisations worldwide, revealing how cybercriminals are leveraging both advanced technologies and the dark web to amplify the scale and ...
OPSWAT and SentinelOne® Enter OEM Partnership to Further Strengthen Multi-Layered Malware Detection with AI

OPSWAT and SentinelOne® Enter OEM Partnership to Further Strengthen Multi-Layered Malware Detection with AI

The addition of SentinelOne’s AI detection capabilities equips OPSWAT customers with faster detection and better coverage across modern infrastructure 
Semperis Research Discovers A Severe Vulnerability In Microsoft Entra ID Impacting 10% of Global SaaS Apps

Semperis Research Discovers A Severe Vulnerability In Microsoft Entra ID Impacting 10% of Global SaaS Apps

Semperis Research Uncovers Ongoing Risk from nOAuth Vulnerability in Microsoft Entra ID, Affecting Enterprise SaaS Applications nOAuth continues to go undetected by SaaS vendors, who may not even know what to look for and it is nearly impossible for enterprise customers to defend against, allowing attackers to take over accounts and exfiltrate data.
Ericsson Mobility Report June 2025 Highlights Growing Monetisation Appeal of 5G Fixed Wireless Access

Ericsson Mobility Report June 2025 Highlights Growing Monetisation Appeal of 5G Fixed Wireless Access

– More than half of all service providers globally who offer fixed wireless access now do so with speed-based monetisation benefits enhanced by 5G – 5G subscriptions to top 2.9 billion globally by the end of 2025 – 5G networks forecast to handle 80 percent of global mobile traffic by the end of 2030
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This