The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Bridging AI Readiness in Australia
With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.

Private Satellites, Public Dangers: Be Alarmed!
Introduction
Can governments and large businesses rely on private Starlink-type networks? In pursuing global connectivity and broader reach, many may overlook the risks associated with private satellite networks. The emergence of private satellite internet networks, led by Starlink and its expanding roster of competitors, has sparked debate about ...

How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025
Ruma Balasubramanian at Check Point Software Technologies provides advice on fostering an inclusive workplace this International Women's Day 2025.

Compliance In Healthcare is Not a Security Strategy
Australia’s healthcare sector is failing at cybersecurity. The latest MediSecure breach, compromising the data of 12.9 million Australians, isn’t an isolated incident—it’s a symptom of a much larger, systemic problem. The industry’s outdated, compliance-driven approach to security is not working. Without a fundamental shift towards data-centric ...

A Supercharged Security Culture is Needed to Navigate Australia’s Cybersecurity Rules
By focusing on an organisation-wide security culture, CISOs can best prepare to meet burgeoning security requirements. Being able to prove the effectiveness of their program with easy-to-understand scoring is also invaluable in maintaining trust, ongoing budget and funding.

The Feminine Firewall: Securing Cyberspace with Heart and Smarts
Introduction
Diversity is the art of thinking independently together.
In ancient times, women played vital roles far beyond their local communities. From the powerful priestesses of Delphi in ancient Greece to strong leaders like Hatshepsut in Egypt, women were not just keepers of cultural heritage but also catalysts for meaningful change. Their ...

CISOs and the C-Suite: The Start of a Beautiful Relationship?
Introduction
Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at major corporations and government agencies in Australia have dominated headlines, forcing ...

The Role of Secure Information Architecture in Transforming Modern Workspaces
Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation Report, nearly one-third of organisations are dissatisfied with their IT infrastructure.1 ...
No results found.
In The News
Cybersecurity Threats and AI Disruptions Top Concerns for IT Leaders in 2026, Veeam Survey Finds
Majority of respondents support a ban on ransomware payments, but cyberattacks and AI automation pose the greatest threat
Veeam® Software, the #1 global leader by market share in Data Resilience polled more than 250 senior IT and business decision-makers worldwide to uncover what key trends will shape IT in 2026. Cybersecurity threats ...
Quorum Cyber Recognized As A Microsoft Security Excellence Awards Finalist
Quorum Cyber has been named as a finalist in at least two categories at the Microsoft Security Excellence Awards since 2023, showing remarkable consistency in providing the highest standards of service delivery and satisfaction to customers worldwide. This year’s recognition closely follows news, in November 2025, that Quorum Cyber was named as a ...
Veeam partners with ServiceNow to power Data Resilience Processes and Workflows
New Veeam App helps organizations orchestrate and manage data protection for critical assets through ServiceNow, strengthening resilience and compliance
Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the Veeam App for ServiceNow, which helps organizations to integrate the management and ...
CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations
CrowdStrike embraces MITRE’s first real-world cross-domain attack simulation, delivering perfect scores with no false positives
AUSTIN, Texas – December 10, 2025 – CrowdStrike (NASDAQ: CRWD) delivered 100% detection and 100% protection with no false positives in the 2025 MITRE ATT&CK® Enterprise Evaluations – the most technically demanding in ...
Wendy Komadina Appointed Darktrace VP ANZ To Spearhead Next Phase Of Partner-Led Growth
Darktrace is pleased to announce the appointment of highly respected Australian technology executive, Wendy Komadina, as Vice President, Australia and New Zealand (ANZ).
Trend Micro Honours Global Leaders in Cybersecurity with 2025 Global Customer Awards
Vantage Markets was awarded Customer Innovator for going beyond standard cybersecurity implementations
SYDNEY, December 11, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the recipients of its 2025 Trend Global Customer Awards, celebrating organisations worldwide for their corporate leadership, ...
New Research Reveals Australians and New Zealanders are Ready for AI-Powered Emergency Response
86% willing to share real-time location data; strong support for AI to detect threats and accelerate response
Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain
After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex infection chain.
The film, Leonardo DiCaprio's latest, has quickly gained notoriety, making it an attractive lure for cybercriminals seeking to infect as ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
