The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – The Late Bloomer

Oracle Cloud – The Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...
Identity Platforms are no Longer Just a Backend Issue

Identity Platforms are no Longer Just a Backend Issue

Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson, Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...
The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.
Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...
Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...
Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

Boards need a robust risk management program and have to foster a cyber-aware culture throughout the organisation starting from the very top to help drive cyber maturity.
No results found.

In The News

Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

SYDNEY – September 25, 2025 – Today Cisco, the worldwide leader in networking and security, announced that Splunk has partnered with the Australian Signals Directorate (ASD) to deliver a new plug-in that integrates Splunk Enterprise Security with ASD’s Cyber Threat Intelligence Sharing (CTIS) platform. This integration allows Splunk customers who are ...
ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

The September 2025 disclosure of ShadowLeak by Radware marks a turning point in the way the security community must think about artificial intelligence. This was not just another prompt injection. It was the first service-side, zero-click indirect prompt injection (IPI) against a widely deployed AI system—OpenAI’s ChatGPT. More importantly, it ...
Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo announced new IT infrastructure solutions tailored to help small and medium businesses (SMBs) easily deploy, scale and leverage modern IT in the era of AI. The solutions are designed to accelerate growth and innovation from day one with pre-tested and validated bundles of servers, software and consumption-based pricing options that help growing ...
Secure Code Warrior Launches Industry-First AI Traceability to Enable Secure Developers and Supercharge Safe Productivity

Secure Code Warrior Launches Industry-First AI Traceability to Enable Secure Developers and Supercharge Safe Productivity

New capabilities in SCW Trust Agent provide visibility and control over LLM usage for security leaders and CISOs
Motorola Solutions voted Best Workplace for Innovators by Fast Company

Motorola Solutions voted Best Workplace for Innovators by Fast Company

Motorola Solutions today announced it has been voted #1 by Fast Company for “Best Workplaces for Innovators.” Motorola Solutions was selected for its leadership in developing purpose-built AI that automates tasks and augments human attention, helping people detect, respond, verify and resolve safety and security threats. Fast Company honoured ...
Barracuda Announces CEO Transition: Rohit Ghai Appointed CEO as Hatem Naguib Steps Down

Barracuda Announces CEO Transition: Rohit Ghai Appointed CEO as Hatem Naguib Steps Down

SYDNEY, Australia – 24 September 2025 – Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for businesses of all sizes, today announced that Rohit Ghai, former Chief Executive Officer (CEO) of RSA, has been appointed CEO of Barracuda. Ghai succeeds Hatem Naguib, who has stepped down from his ...
Check Point Software Technologies Expands Australian Presence with Local Check Point Harmony SASE Data Residency and Check Point CloudGuard Web Application Firewall Instance

Check Point Software Technologies Expands Australian Presence with Local Check Point Harmony SASE Data Residency and Check Point CloudGuard Web Application Firewall Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Dynatrace Empowers GMHBA to Enhance Observability and Member Experience

Dynatrace Empowers GMHBA to Enhance Observability and Member Experience

SYDNEY, 24 September 2025 – Dynatrace, the leading AI-powered observability platform, today announced its successful collaboration with Australia's leading regionally based private health insurer GMHBA, to transform the performance and reliability of its technology infrastructure. The partnership has equipped GMHBA with advanced tools to predict and ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This