The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Securing the Underdogs – Kelly Sabo on SMB Cybersecurity Essentials
Introduction
The often overlooked yet backbone for the Australian market - is small and medium-sized businesses (SMBs). SMB’s don’t often get spoken about in the media in relation to cybersecurity (perhaps we [KBI.Media] is to blame). But in comes Kelly Sabo, Head of SMB and Mid-Market ANZ at Cisco who shares light on the vulnerabilities and solutions ...

Unified Powerhouse: Cisco and Splunk Together
Tom Casey Senior Vice President, Products & Technology at Splunk recently presented at Cisco Live in Melbourne about the critical intersection of digital resilience, network assurance, and cloud observability during his keynote on the main stage.
Highlighting Cisco's integration with Splunk, Casey laid out a comprehensive vision for the future ...

How Growing Australian Organisations Can Keep Their Physical Security On Lock
Businesses thrive on periods of sustained growth, but it’s important to have systems and security settings that can keep up with the requirements of an expanding physical and geographical footprint.
Claroty 2025 Cyber Security Predictions
The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness
A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an ...

AI Ethics: Developing AI models with intent, transparency and diversity
As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a laundry list of ethical concerns.

Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise
Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.

The Role of Data And AI In Cyber Defence
With cyber-attacks are becoming increasingly sophisticated and frequent, there’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from automating threat detection, analysing vast amounts of data for anomalies, and responding to potential breaches in real-time as well as providing a more effective response which ...

Taking A Borderless Approach To Cybersecurity Governance
Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all sectors.
With attacks becoming more frequent and sophisticated, there’s a compelling need ...
No results found.
In The News
ColorTokens Announces Integration with the CrowdStrike Falcon Platform
SAN JOSE, Calif., September 11, 2025 — ColorTokens Inc., today announced the integration of its Xshield Enterprise Microsegmentation Platform™ with the CrowdStrike Falcon® platform. Now available on the CrowdStrike Marketplace, the integration enables customers to accelerate Zero Trust adoption by leveraging CrowdStrike Falcon Firewall Management to ...
ColorTokens Appoints Louis (Lou) Eichenbaum as Federal Chief Technology Officer
Former U.S. Department of the Interior Chief Information Security Officer and Nationally Recognized Zero Trust Advocate to Advance Company’s Federal Cybersecurity Strategy.
Autonomous AI Agents Expand Attack Surface: Key Insights from Radware’s “Internet of Agents” Report
Radware’s latest threat intelligence report, The Internet of Agents: The Next Threat Surface, delivers a stark warning for cybersecurity leaders. The rise of agentic AI—autonomous agents capable of reasoning, invoking tools, and interacting via emerging inter-agent protocols—marks a fundamental shift in how digital systems operate. But as organisations ...
Age Checks Set to Transform How Kids Play and Interact Online
Sydney, Australia, 17 September 2025 – With kids in Australia spending an average of over two hours each day on gaming platforms, and nearly one in three young gamers reporting bullying or abuse, regulatory pressure is mounting on online platforms to provide age-appropriate environments for kids.
As well as the upcoming under-16s social media ban, ...
Sophos Report Finds Education Sector Strengthening Against Ransomware, but IT Teams Pay Personal Price
Recovery times improving with 97% of victims recovering encrypted data; ransom payments fall sharply
Anomali Launches Protect Virtual Conference ANZ 2025
A Virtual User Conference for Cybersecurity and IT Leaders and Professionals Navigating Cyber Risk in the AI Era
Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises
Together, Check Point and Lakera deliver one of the most advanced AI-native security platform, built to protect the full lifecycle of AI
CrowdStrike and Salesforce Partner to Secure the Future of AI-Powered Business
Integration of Falcon Shield with Salesforce Security Center and Charlotte AI with Agentforce delivers enhanced protection, visibility, and faster response for mission-critical AI agents, applications, and workflows
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
