The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.
What’s New in Microsegmentation in 2025

What’s New in Microsegmentation in 2025

Know what microsegmentation vendors are offering in 2025 to boost zero trust strategies and counter advanced cyber threats.
The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future

The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future

The convergence of Quantum Computing, AI, Blockchain, and Cybersecurity is redefining the technological landscape. These interconnected innovations are revolutionizing industries and reshaping digital trust, security, and efficiency. Understanding their relationships is crucial for future preparedness.
Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was ...
Under Attack: Exposing Upscale Hacktivist DDoS Tactics

Under Attack: Exposing Upscale Hacktivist DDoS Tactics

This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.
Benjamin Lamont & Helen Schneider – Australian Federal Police

Benjamin Lamont & Helen Schneider – Australian Federal Police

Watch The Interview Biography Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, ...
How to Outsmart Ransomware and Build Resilience Within Your Organisation

How to Outsmart Ransomware and Build Resilience Within Your Organisation

Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, ...
The Strategic Transformation of IT: From Cost Center to Business Catalyst

The Strategic Transformation of IT: From Cost Center to Business Catalyst

The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average ...
No results found.

In The News

Gen Z Staff Lead Workplace AI Adoption Despite Job Fears – Microsoft Australia Study

Gen Z Staff Lead Workplace AI Adoption Despite Job Fears – Microsoft Australia Study

Gen Z workers are enthusiastically embracing AI at work – and doing so with cautious optimism – according to a new Microsoft Australia study.
DroneShield Releases RfPatrol-Plugin for the TAK Ecosystem

DroneShield Releases RfPatrol-Plugin for the TAK Ecosystem

DroneShield today announced the release of its RfPatrol-Plugin for the Team Awareness Kit (TAK) ecosystem, now available for RfPatrol Mk2 users via the DroneShield Access Portal. The plugin integrates DroneShield’s counter-drone intelligence directly into the civilian TAK command-and-control (C2) environment, supplementing existing data streams, gRPC ...
BlackBerry SecuSUITE Expands to Windows Devices, Extending Sovereign-Grade Protection Across the Digital Workplace

BlackBerry SecuSUITE Expands to Windows Devices, Extending Sovereign-Grade Protection Across the Digital Workplace

WATERLOO, ONTARIO – October 9 – BlackBerry Limited (NYSE: BB; TSX: BB) today announced the expansion of BlackBerry® SecuSUITE® to Windows® devices, extending sovereign-grade secure communications trusted by governments and critical enterprises to include laptops and workstations. This expansion will enable secure voice, messaging, and file sharing ...
Inside Akira’s SonicWall Campaign: Darktrace’s Detection and Response

Inside Akira’s SonicWall Campaign: Darktrace’s Detection and Response

Between July and August 2025, security teams worldwide observed a surge in Akira ransomware incidents involving SonicWall SSL VPN devices. Initially believed to be the result of an unknown zero-day vulnerability, SonicWall later released an advisory announcing that the activity was strongly linked to a previously disclosed vulnerability, ...
Bitdefender Launches Global Campaign to Combat AI-Driven Scams Targeting Families

Bitdefender Launches Global Campaign to Combat AI-Driven Scams Targeting Families

SYDNEY – 10 October 2025 – Bitdefender, a global leader in cybersecurity protection, today announced the launch of They Wear Our Faces, a global scam awareness campaign designed to educate consumers about the continued growth and sophistication of online scams. Timed with Cybersecurity Awareness Month, the campaign highlights the dangers of deepfake ...
Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A

Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A

Panther Lake will enter high-volume production at Intel’s newest fab in Arizona later this year as company invests in strengthening U.S. technology and manufacturing leadership.
CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

Machine identities outnumber human identities by 82 to 1. Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges. CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens today reaffirmed its commitment to the Australian market including federal, state, and local government agencies, regulated industries, critical infrastructure operators, and enterprises.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This