The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Unmasking the Digital Puppet Masters
In a world where the line between truth and deception blurs with every click, the silent warriors of the digital realm rise to combat an unseen enemy. Malcolm Purcell, Vice President of APAC at Fivecast, unravels the tangled web of open-source intelligence (OSINT) and its pivotal role in upholding national security.The Digital Haystack: Easier Said ...

Why Our Cybersecurity Defences Are Crumbling
According to Michael Loewy, Co-Founder of Tide and a veteran in the field of cybersecurity, the reality is that our cybersecurity defences are crumbling."The industry is broken," he declares.What's broken about it?"Just open the news," he urges, pointing to the incessant barrage of headlines detailing mass data breaches and ...

From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown
Nadir Izrael, Co-Founder & CTO, Armis explains how AI-powered threat intelligence can better protect critical infrastructure and national security, as Australian organisations face enhanced cyber security obligations.

Data Privacy Day – Qualys Shares Insights For Effective Data Security
Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.
Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection
Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns.
The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly complex and sophisticated. The developers behind these phishing kits invest ...

Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy
Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.

Cybersecurity In 2025: What Will And Needs To Transpire
In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand ...

Data Transfer Secrets Revealed
From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks, or "Tony" as I’ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel.
Reynolds’ belief and metaphor he goes by is: ...
No results found.
In The News
Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A
Panther Lake will enter high-volume production at Intel’s newest fab in Arizona later this year as company invests in strengthening U.S. technology and manufacturing leadership.
CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control
Machine identities outnumber human identities by 82 to 1.
Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges.
CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia
ColorTokens today reaffirmed its commitment to the Australian market including federal, state, and local government agencies, regulated industries, critical infrastructure operators, and enterprises.
Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution
87 per cent of cybersecurity professionals expect artificial intelligence to enhance their roles, offering efficiency and relief amid cyber skill shortages, but they require upskilling to unlock full potential
Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering
Semperis' first-of-its-kind Ready1 for Identity Crisis Management combines market-leading hybrid identity recovery and crisis management to streamline out-of-band communications, reporting, and identity recovery
Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights
Sydney, Australia – 9 October, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all size business, has introduced Barracuda Research, a new centralised resource for threat intelligence, real-world incident analysis, email threat detection data from Barracuda AI, and more. ...
Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition
Sophos today announced it has been named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment (doc #US52997325, September 2025) report.
The IDC MarketScape for Extended Detection and Response cites Sophos’ protection capabilities as a strength, noting, “Sophos is viewed favourably in terms ...
WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns
If you’ve ever wondered how someone could lose access to their WhatsApp account in a matter of seconds, the answer lies in cleverly crafted scams. Cybercriminals don’t need advanced malware or sophisticated hacking tools – instead they exploit trust, urgency, and empathy.
Bitdefender Labs has been monitoring a rapidly expanding campaign that ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
