The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Addressing Lateral Movement Threats Against Australian Entities
With Australian and international authorities calling out lateral movement incidents multiple times this year, it’s clearly an area where improvements are being urgently sought.
A key trend to gain momentum this year was the issuance of multi-country-led advisories outlining the tradecraft of threat groups striking both Australian and allied ...

Top Ten List: Reasons to Use Microsegmentation
Learn the top 10 reasons to implement microsegmentation in your cybersecurity strategy. Protect against malware, ransomware, and insider threats today.

How SecOps Can Leverage AI And Automation For Faster, Smarter Incident Management
Managing modern cyber threats is becoming tougher for security operations (SecOps) teams. Attack surfaces are expanding, and threats are becoming more sophisticated. Fortunately, artificial intelligence (AI) and automation provide the speed, precision, and efficiency that manual methods can no longer match.
Cornelius Mare, chief information security ...

Why Microsegmentation is the Key to Containing Breaches in Today’s Cybersecurity Landscape
Discover why microsegmentation is vital for breach readiness. Learn how it prevents lateral movement, protects sensitive data, and ensures business continuity amidst evolving cyber threats.

Navigating Cybersecurity Decision-making In The Age Of AI: Insights Into Operational, Tactical, And Strategic Influences
The factors that impact all decisions in cybersecurity mainly stem from four sources: industry, organisation, team, and individual.

Why Breaking Down Identity Silos Has Become An Imperative For Business
In an increasingly complex IT environment, a unified IAM solution is essential for reducing security vulnerabilities and optimising resource allocation. A comprehensive IAM platform centralises identity management across on-premises, cloud, and hybrid environments, creating a secure and agile organisation.

The Revitalised Cisco – with AI Prowess
Technology giant, Cisco seems to be defying the trend by not only adapting AI but leading the charge in several strategic areas. Tom Gillis, Senior Vice President and General Manager, Security Business Group at Cisco, recently presented on main stage at Cisco Live in Melbourne about the transformative journey and the new vision driving the company ...

Post-Quantum Cryptography And Compliance: Where Are We Now?
As quantum computing technology advances, traditional cryptographic protocols are at risk, prompting regulatory bodies to urge the adoption of quantum-safe measures. This article explores how Post-Quantum Cryptography (PQC) plays a vital role in securing sensitive data and ensuring compliance across industries. Highlighting standards from organisations ...
No results found.
In The News
Claroty Named to Forbes Cloud 100 for Fourth Consecutive Year
Claroty, the world’s leading cybersecurity company for cyber-physical systems (CPS) protection, has been listed on the Forbes 2025 Cloud 100 for the fourth consecutive year.
Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland
Brisbane, 5 September 2025 - In a significant step forward for sovereign cyber defence, The Hon. Steven Minnikin MP, Minister for Customer Services and Open Data and Minister for Small and Family Business, has officially opened Queensland headquartered Cube Cyber’s new Security Operations Centre (SOC) in Brisbane.
The Cube Cyber centre represents a ...
Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According To New Independent TEI Study
SYDNEY, AUSTRALIA – Sept. 5, 2025 – Boomi™, the leader in AI-driven automation, today announced the results of a new Total Economic Impact™ (TEI) study conducted by Forrester Consulting. The study found that organisations using the Boomi Enterprise Platform achieved a 347 per cent return on investment (ROI) and a net present value (NPV) of $9.8 million ...
Claroty Named a Leader In IoT Security By Leading Independent Research Firm
New analyst report gives Claroty highest score possible across 10 current offering and strategy criteria
Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy
Redwood City, CA – September 2, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of Brett Theiss as Chief Marketing Officer (CMO). As CMO, Theiss will shape and accelerate Check Point’s global growth agenda, strengthening brand presence, fuelling ...
Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links
SYDNEY, Australia – 4 September 2025 – Barracuda threat analysts have published a report on the latest techniques being used by the Tycoon phishing-as-a-service (PhaaS) kit to hide malicious links in emails. The techniques are designed to obscure, muddle and disrupt the structure of links, or URLs, with the aim of confusing automated detection systems ...
Veeam Launches Its First Fully Preconfigured, Software-only Appliance
Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, and Windows ...
Sophos Endpoint Now Integrated with Taegis MDR and XDR
Sophos has announced that its endpoint Solution is now natively integrated and automatically included in all Taegis™ Extended Detection and Response (XDR) and Taegis Managed Detection and Response (MDR) subscriptions. This milestone gives customers immediate access to combined prevention, detection, and response capabilities in a single platform – ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
