The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Organisations Can Achieve Secure-By-Design By 2030
Secure-by-design is no longer a futuristic ideal - it is an imperative for organisations aiming to fortify their cybersecurity defences by 2030. Achieving this transformation requires leadership commitment, developer education, and a shift in corporate culture.

Teachers Need to Focus on Teaching – AI’s Role in Classrooms
At the Microsoft AI Tour 2024, Leigh Williams, Chief Information Officer and IT Executive at Brisbane Catholic Education, shared her opinion on how Artificial Intelligence (AI) is reshaping the education arena. From reducing administrative burdens on teachers to enabling hyper-personalised learning, AI is assisting the way students engage with their ...

AI is No Longer an Option – It’s Essential According to the AFP
Introduction
The Australian Federal Police (AFP) shared at the Microsoft AI Tour 2024, how artificial intelligence (AI) is remoulding crime prevention, particularly in handling large amounts of data and countering cyber threats. Ben Lamont, Chief Data Officer at AFP, and Helen Schneider, leader of the Australian Centre to Counter Child Exploitation ...

The New Secure Communications Realities for Governments
With the security of messaging apps once again in question, find out everything you need to know about ensuring the highest levels of security for high-stakes government communications. Only one solution is certified to meet all the requirements for modern, government-grade communications security: BlackBerry® SecuSUITE® from BlackBerry Secure Communications.
RedCurl’s Ransomware Debut
Introduction
This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data ...

Countering Pockets of Resistance to Cybersecurity Action
The real issue today for cybersecurity leaders is understanding and navigating the complexity and broader challenges of user adoption and resistance, bringing some key strategies to limit resistance to bear. In this way, the rate of adoption versus resistance can become a measure of success of the project, not an inhibitor to it.

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter
Richard Seiersen argues that while AI continues to make waves in cybersecurity, the fundamentals of cybersecurity remain unchanged — and organisations shouldn’t be distracted by the noise, nor should the core security principles require a radical rethink. Quoting French writer Alphonse Karr, “The more things change, the more they stay the same”.

The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption
Artificial intelligence (AI) is revolutionizing cryptanalysis, making traditional symmetric key encryption increasingly vulnerable. AI-driven differential and sectional attacks can now exploit minor weaknesses in encryption schemes with unprecedented efficiency. Organizations must adopt crypto-resilient architectures like Quantum-Powered Encryption ...
No results found.
In The News
JFrog Appoints Genefa Murphy as Chief Marketing Officer to Accelerate Its Next Growth Phase
Sydney, Australia – January 6, 2026 — JFrog Ltd (Nasdaq: FROG), the Liquid Software company, today announced the appointment of Genefa Murphy as Chief Marketing Officer, effective immediately. Murphy brings an expansive resume to JFrog, as a seasoned CMO and go-to-market (GTM) leader with established success in driving global enterprise software growth ...
DroneShield Secures $8.2M Western Military Contract
DroneShield has announced it has received a contract for $8.2 million from an in-country reseller for delivery to a western military end-customer. The reseller is a wholly owned subsidiary of a multi-billion dollar, global, publicly listed customer that is required to distribute the products to the western military government department in-country. The ...
Palo Alto Networks and Google Cloud Forge Landmark Agreement to Help Customers Securely Accelerate Cloud and AI Initiatives
SYDNEY, Australia, Dec. 22, 2025 /PRNewswire/ - As enterprises race to harness the transformative power of agentic AI and cloud computing, Palo Alto Networks (NASDAQ: PANW) and Google Cloud today announced a significant expansion of their strategic partnership to enable the secure development and deployment of AI solutions and provide a trusted ...
DigiCert Forecasts the Security Priorities Poised to Define 2026
From AI to quantum, eight tech predictions that show what organisations must brace for next year
NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management
NinjaOne recently announced that it has been recognised as a Leader in two IDC MarketScape reports:
Worldwide Unified Endpoint Management Software for Small and Medium Businesses (doc # US53003425, December 2025)
Worldwide Client Endpoint Management Software for Windows Device Management (doc # US53002925, December 2025)
NinjaOne was also ...
Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro
Innovation Partnership Award highlights deep collaboration, real-time intelligence sharing, and advanced security deployment across one of Australia’s leading financial trading platforms
The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat
New Infoblox Threat Intel research finds that over 90 per cent of visits to parked domains now redirect users to malicious content, reversing a decade old risk profile.
Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales
Study shows verified brand identities in email protect consumers from phishing while driving higher engagement and brand credibility during peak online shopping season and beyond
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
