The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Organisations Can Achieve Secure-By-Design By 2030
Secure-by-design is no longer a futuristic ideal - it is an imperative for organisations aiming to fortify their cybersecurity defences by 2030. Achieving this transformation requires leadership commitment, developer education, and a shift in corporate culture.

Teachers Need to Focus on Teaching – AI’s Role in Classrooms
At the Microsoft AI Tour 2024, Leigh Williams, Chief Information Officer and IT Executive at Brisbane Catholic Education, shared her opinion on how Artificial Intelligence (AI) is reshaping the education arena. From reducing administrative burdens on teachers to enabling hyper-personalised learning, AI is assisting the way students engage with their ...

AI is No Longer an Option – It’s Essential According to the AFP
Introduction
The Australian Federal Police (AFP) shared at the Microsoft AI Tour 2024, how artificial intelligence (AI) is remoulding crime prevention, particularly in handling large amounts of data and countering cyber threats. Ben Lamont, Chief Data Officer at AFP, and Helen Schneider, leader of the Australian Centre to Counter Child Exploitation ...

The New Secure Communications Realities for Governments
With the security of messaging apps once again in question, find out everything you need to know about ensuring the highest levels of security for high-stakes government communications. Only one solution is certified to meet all the requirements for modern, government-grade communications security: BlackBerry® SecuSUITE® from BlackBerry Secure Communications.
RedCurl’s Ransomware Debut
Introduction
This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data ...

Countering Pockets of Resistance to Cybersecurity Action
The real issue today for cybersecurity leaders is understanding and navigating the complexity and broader challenges of user adoption and resistance, bringing some key strategies to limit resistance to bear. In this way, the rate of adoption versus resistance can become a measure of success of the project, not an inhibitor to it.

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter
Richard Seiersen argues that while AI continues to make waves in cybersecurity, the fundamentals of cybersecurity remain unchanged — and organisations shouldn’t be distracted by the noise, nor should the core security principles require a radical rethink. Quoting French writer Alphonse Karr, “The more things change, the more they stay the same”.

The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption
Artificial intelligence (AI) is revolutionizing cryptanalysis, making traditional symmetric key encryption increasingly vulnerable. AI-driven differential and sectional attacks can now exploit minor weaknesses in encryption schemes with unprecedented efficiency. Organizations must adopt crypto-resilient architectures like Quantum-Powered Encryption ...
No results found.
In The News
Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale
Cisco and ServiceNow deepen partnership to ensure customers can adopt and scale AI securely and efficiently.
Companies will bring portfolios closer together to help enterprises evolve their organizations as they embrace AI.
First planned integration will tackle AI security and risk with Cisco AI Defense and ServiceNow’s Security Operations ...
Qualys Unveils Policy Audit with Enhanced Efficiency for Continuous Audit Readiness
Enhancements streamline evidence collection, prioritise risk-based remediation, and ensure continuous audit readiness, helping organisations reduce compliance costs and regulatory exposure
Rapid7 Launches Managed Detection & Response (MDR) for Enterprise, a Fully Managed and Customised Service
Rapid7 has launched Managed Detection & Response (MDR) for Enterprise, a fully managed and customisable detection and response service designed to meet the unique demands of complex, distributed enterprise environments.
Check Point Software Technologies and Illumio Accelerate Zero Trust Adoption with Proactive Threat Prevention and Unified Intelligence
Integration accelerates breach identification and containment, effectively stops lateral movement of threats across the enterprise
Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia
Honeywell today announced its Integrated Controls and Safety System (ICSS) will be designed and implemented in Iluka Resources’ (Iluka) Eneabba rare earths refinery in Western Australia to help improve production efficiency and create a safer environment for its workers. Through a strategic partnership between the Australian Government and Iluka, the ...
Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group
Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider.
This strategic implementation will modernise and integrate business ...
Tenable Research in Verizon DBIR: Additional Research Analysis
Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited ...
New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses
Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into the evolving threat landscape of ransomware attacks. With cyber threats becoming more sophisticated and frequent, the report underlines the need for organisations to prioritise ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..