The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day

Rome was not Built in a Day. Security is not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture

Why It Takes More Than Phishing Tests To Build A Cyber Aware Culture

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

Cybersecurity Needs An Image Make-Over To Attract The Diverse Skills Needed To Protect Our Nation

There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...
Breaking Down Barriers to Cybersecurity Frameworks

Breaking Down Barriers to Cybersecurity Frameworks

Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s Essential Eight, effectively.   The complexity of deployment, the need for a cultural ...
No results found.

In The News

Symal Group Builds On Growth, DevOps and AI Capabilities With Macquarie Cloud Services

Symal Group Builds On Growth, DevOps and AI Capabilities With Macquarie Cloud Services

Macquarie Cloud Services today announced it is providing Microsoft Azure public cloud services to Symal Group to support the company’s digital foundation and rapid growth. Symal Group was founded in Melbourne with ‘a shovel, a wheelbarrow, and a ute’ in 2001, and has since evolved into a newly ASX-listed construction giant. The Group comprises five ...
SecurityBridge Expands Popular “Secure Together” SAP Security Event To The U.S.

SecurityBridge Expands Popular “Secure Together” SAP Security Event To The U.S.

The “Secure Together on the Road” event will occur on April 10, 2025, at the NASA Space Center in Houston, TX. SAP security professionals and IT leaders will gather to tackle the evolving cybersecurity challenges in SAP enterprise landscapes.
GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Copilot is getting a whole lot more agentic with increased context of tools and services, powered by the world’s leading models, starting today.
Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

New research by Dark Reading commissioned by Qualys, The State of Cloud & SaaS Security Report, reveals top cloud and SaaS security threats facing enterprises today.
Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web Sydney, 4 April 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has emerged as a leading player in Attack Surface ...
AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

SYDNEY – April 4, 2025 – Delinea, a leading provider of solutions for securing human and machine identities through centralised authorisation, today released its inaugural Cybersecurity and the AI Threat Landscape report. The report, based on exclusive Delinea Labs research and an analysis of several third-party studies and real-world cyber incidents, ...
Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks, a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today presents the 32nd edition of the Technology Radar. The biannual report is built on Thoughtworks’ frontline experiences solving its clients’ most complex business challenges. The latest edition of the Thoughtworks ...
SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds (NYSE:SWI), a leading provider of simple, powerful, and secure observability and IT management solutions, today announced a major step forward in helping businesses achieve IT operational resilience. The latest enhancements across the SolarWinds portfolio integrate expanded capabilities across observability, incident response, service ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This