The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The ...
Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and ...
The Challenges of Underfunding Data Teams: How Data Drives AI and Security

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

This article delves into the critical role of data teams in supporting AI and security initiatives within organisations. It highlights the challenges that arise from underfunding these teams, emphasising the importance of data quality, governance, and management. The piece explores the imbalance in budget allocation, potential risks, and inefficiencies ...
Google’s Acquisition of Wiz Signals a Shift in Cloud Security

Google’s Acquisition of Wiz Signals a Shift in Cloud Security

The cloud security landscape is facing a seismic shift. With Google’s recent acquisition of Wiz, one of the industry’s most prominent cloud security providers, many in the industry are considering the implications of cloud providers also serving as vendors. Organisations operating in multi-cloud and hybrid environments must carefully evaluate how these ...
Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Australia faces another significant cybersecurity breach, this time targeting superannuation funds managing trillions in retirement savings. This attack highlights a severe erosion of public trust and underscores the gap between Australia's ambitious cybersecurity goals and actual readiness. Discover how lax security protocols, regulatory shortcomings, ...
Microsoft’s Cybersecurity Vet to Vendor Visionary

Microsoft’s Cybersecurity Vet to Vendor Visionary

Tech giant, Microsoft, is heavily focused on building long-term trust with customers and re-establishing how cybersecurity leaders engage with the company. Mick Dunne, Chief Security Adviser for Asia Pacific at Microsoft, shared insights into the newly established Customer Security Officer (CSO) team, a strategic initiative. Dunne, who transitioned ...
How Organisations Can Achieve Secure-By-Design By 2030

How Organisations Can Achieve Secure-By-Design By 2030

Secure-by-design is no longer a futuristic ideal - it is an imperative for organisations aiming to fortify their cybersecurity defences by 2030. Achieving this transformation requires leadership commitment, developer education, and a shift in corporate culture.
Teachers Need to Focus on Teaching – AI’s Role in Classrooms

Teachers Need to Focus on Teaching – AI’s Role in Classrooms

At the Microsoft AI Tour 2024, Leigh Williams, Chief Information Officer and IT Executive at Brisbane Catholic Education, shared her opinion on how Artificial Intelligence (AI) is reshaping the education arena. From reducing administrative burdens on teachers to enabling hyper-personalised learning, AI is assisting the way students engage with their ...
No results found.

In The News

NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne recently announced that it has been recognised as a Leader in two IDC MarketScape reports: Worldwide Unified Endpoint Management Software for Small and Medium Businesses (doc # US53003425, December 2025) Worldwide Client Endpoint Management Software for Windows Device Management (doc # US53002925, December 2025) NinjaOne was also ...
Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Innovation Partnership Award highlights deep collaboration, real-time intelligence sharing, and advanced security deployment across one of Australia’s leading financial trading platforms
The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

New Infoblox Threat Intel research finds that over 90 per cent of visits to parked domains now redirect users to malicious content, reversing a decade old risk profile.
Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Study shows verified brand identities in email protect consumers from phishing while driving higher engagement and brand credibility during peak online shopping season and beyond
Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Collaboration integrates firewalling, segmentation, and policy enforcement directly into NVIDIA BlueField-accelerated infrastructure for higher performance, stronger isolation, and simpler operations
Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated cybercriminal collective, and Mustang Panda, which Sophos X-Ops tracks ...
Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across telecommunications, cloud, cybersecurity, and data centres. Clifton, who after nearly 15 years in senior leadership, including more than a decade leading Macquarie Telecom, has ...
Kyndryl Unveils Quantum Safe Assessment Service to Enable Enterprise Readiness for the Quantum Era

Kyndryl Unveils Quantum Safe Assessment Service to Enable Enterprise Readiness for the Quantum Era

New service helps organisations identify cryptographic vulnerabilities and build scalable post-quantum strategies
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This