The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unified Powerhouse: Cisco and Splunk Together

Unified Powerhouse: Cisco and Splunk Together

Tom Casey Senior Vice President, Products & Technology at Splunk recently presented at Cisco Live in Melbourne about the critical intersection of digital resilience, network assurance, and cloud observability during his keynote on the main stage. Highlighting Cisco's integration with Splunk, Casey laid out a comprehensive vision for the future ...
How Growing Australian Organisations Can Keep Their Physical Security On Lock

How Growing Australian Organisations Can Keep Their Physical Security On Lock

Businesses thrive on periods of sustained growth, but it’s important to have systems and security settings that can keep up with the requirements of an expanding physical and geographical footprint.
Claroty 2025 Cyber Security Predictions

Claroty 2025 Cyber Security Predictions

The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an ...
AI Ethics: Developing AI models with intent, transparency and diversity

AI Ethics: Developing AI models with intent, transparency and diversity

As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a laundry list of ethical concerns.
Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.
The Role of Data And AI In Cyber Defence

The Role of Data And AI In Cyber Defence

With cyber-attacks are becoming increasingly sophisticated and frequent, there’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from automating threat detection, analysing vast amounts of data for anomalies, and responding to potential breaches in real-time as well as providing a more effective response which ...
Taking A Borderless Approach To Cybersecurity Governance

Taking A Borderless Approach To Cybersecurity Governance

Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all sectors. With attacks becoming more frequent and sophisticated, there’s a compelling need ...
Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices.
No results found.

In The News

Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, and Windows ...
Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos has announced that its endpoint Solution is now natively integrated and automatically included in all Taegis™ Extended Detection and Response (XDR) and Taegis Managed Detection and Response (MDR) subscriptions. This milestone gives customers immediate access to combined prevention, detection, and response capabilities in a single platform – ...
BT Enters Agreement with TNS for the Sale of its Radianz Business

BT Enters Agreement with TNS for the Sale of its Radianz Business

BT and Transaction Network Services (TNS) today announced that TNS has agreed to acquire BT’s Radianz business. The transaction is expected to complete during the first half of 2026, subject to customary closing conditions, including regulatory clearance.
McLaren Racing Announces Trend Micro as an Official Partner of the McLaren Formula 1 Team 

McLaren Racing Announces Trend Micro as an Official Partner of the McLaren Formula 1 Team 

Highw-performance alliance built to stay ahead, on track and in cybersecurity
Check Point Software Technologies Appoints David Caspari as Managing Director for Australia & New Zealand (ANZ) to Drive Growth and Cyber Leadership

Check Point Software Technologies Appoints David Caspari as Managing Director for Australia & New Zealand (ANZ) to Drive Growth and Cyber Leadership

Sydney, Australia – September 3, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of industry leader David Caspari as Managing Director for Australia and New Zealand (ANZ). Caspari will lead Check Point’s business in the region, expanding customer and ...
ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape

ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape

ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape
F5 Recognised as Leader in Web Application and API Protection (WAAP) in the KuppingerCole 2025 Leadership Compass Report

F5 Recognised as Leader in Web Application and API Protection (WAAP) in the KuppingerCole 2025 Leadership Compass Report

F5 Application Delivery and Security Platform (ADSP) showcased as a leader across multiple WAAP categories
Cohesity Appoints James Eagleton as Managing Director for Australia and New Zealand

Cohesity Appoints James Eagleton as Managing Director for Australia and New Zealand

SYDNEY, Australia – September 1, 2025 – Cohesity, the leader in AI-powered data security, today announced the appointment of James Eagleton as Managing Director for Australia and New Zealand (ANZ). In this role, Eagleton will be responsible for driving Cohesity’s overall business strategy, sales operations, and growth initiatives across the ANZ ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This