The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Role of Secure Information Architecture in Transforming Modern Workspaces

The Role of Secure Information Architecture in Transforming Modern Workspaces

Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation Report, nearly one-third of organisations are dissatisfied with their IT infrastructure.1 ...
Same, Same But Not Different.

Same, Same But Not Different.

The first few weeks of the year signals the back to work influx, in many cases now also a return to the office, from the suburbs to the city. For the vast majority, even in 2025, it means back to the same desk and view surrounded by the same people who most likely did the same things during the 2025 Summer as they did during 2024 or any other summer ...
Building ExeQuantum: The Challenges of Innovating in a Market That Doesn’t Know It’s at Risk Yet

Building ExeQuantum: The Challenges of Innovating in a Market That Doesn’t Know It’s at Risk Yet

As the CEO of ExeQuantum, I spend my days immersed in the world of post-quantum cryptography (PQC), a space that feels both ahead of its time and painfully urgent. The irony is clear, while the quantum threat is rapidly approaching, most industries still treat security as an afterthought, something to worry about later. The frustrating part? "Later" ...
Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.
What’s New in Microsegmentation in 2025

What’s New in Microsegmentation in 2025

Know what microsegmentation vendors are offering in 2025 to boost zero trust strategies and counter advanced cyber threats.
The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future

The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future

The convergence of Quantum Computing, AI, Blockchain, and Cybersecurity is redefining the technological landscape. These interconnected innovations are revolutionizing industries and reshaping digital trust, security, and efficiency. Understanding their relationships is crucial for future preparedness.
Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was ...
Under Attack: Exposing Upscale Hacktivist DDoS Tactics

Under Attack: Exposing Upscale Hacktivist DDoS Tactics

This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.
No results found.

In The News

Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

As organisations race to adopt artificial intelligence, the world’s cybersecurity leaders are being forced to rethink their entire defensive playbook. New research from Gigamon reveals that as AI reshapes how businesses innovate and how adversaries operate, chief information security officers (CISOs) are recalibrating their risk strategies to meet a ...
Malaysia Expands Deployment of BlackBerry Secure Communications for the  46th and 47th ASEAN Summits

Malaysia Expands Deployment of BlackBerry Secure Communications for the 46th and 47th ASEAN Summits

Malaysia modernizes mobile command and control, securing voice and messaging for inter-agency coordination with BlackBerry AtHoc and BlackBerry SecuSUITE
Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Today, Sophos announced the launch of Sophos Identity Threat Detection and Response (ITDR). This new solution for Sophos XDR and Sophos MDR continuously monitors customer environments for identity risks and misconfigurations and scans the dark web for compromised credentials. It enables organizations to detect and respond to identity-based attacks ...
Splunk Report Shows Observability is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Splunk Report Shows Observability is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Cisco today announced the release of the Splunk State of Observability 2025: The Rise of a Business Catalyst report, marking its fifth annual analysis into the evolving landscape of observability. This year's research highlights the critical role observability plays in delivering business value – from elevating customer experience and boosting employee ...
KBI.Media Announces Season Two of Destination Cyber, with New Host Chaahat Baghla

KBI.Media Announces Season Two of Destination Cyber, with New Host Chaahat Baghla

Sydney, Australia - Oct 21st - KBI.Media is proud to announce the launch of Destination Cyber: Season Two, featuring new host Chaahat Baghla, a rising cybersecurity voice and final-year student at Macquarie University, where she is completing a Bachelor of Cybersecurity. Baghla brings a student’s perspective and professional curiosity to the platform, ...
Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salt Typhoon, a China-linked cyber espionage group, has been observed targeting global infrastructure using stealthy techniques such as DLL sideloading and zero-day exploits. Darktrace recently identified early-stage intrusion activity consistent with Salt Typhoon’s tactics, reinforcing the importance of anomaly-based detection over traditional ...
CrowdStrike 2025 APJ eCrime Landscape Report: Chinese Underground Marketplaces Drive Billions in Illicit Transactions; AI-accelerated Ransomware Surges

CrowdStrike 2025 APJ eCrime Landscape Report: Chinese Underground Marketplaces Drive Billions in Illicit Transactions; AI-accelerated Ransomware Surges

Chinese-speaking actors evade government restrictions and solicit criminal services through anonymized marketplaces; AI-accelerated ransomware operations signal next evolution of threats
DroneShield Strengthens Technology Leadership Team

DroneShield Strengthens Technology Leadership Team

DroneShield has announced the appointment of Angus Harris to the role of Chief Technology Officer (CTO). This appointment reflects the Company’s continued growth and organisational maturity as it scales to meet accelerating global demand across defence and government markets. Mr. Harris brings a wealth of technical and leadership experience from his ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This