The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk
Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in.

The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.
As quantum computing advances, the conversation around post-quantum cryptography (PQC) has largely focused on mitigating security risks. However, this transition brings more than just enhanced protection - it unlocks new opportunities for businesses and industries worldwide. This article explores how the shift away from one-size-fits-all cryptography, ...

Quantum Computing – The Next Frontier
Are we there yet with quantum computing? Paddy McGuinness, former UK Deputy National Security Advisor and current Senior Advisor at Brunswick Group, brings insights into the quantum conversation from leading national resilience and cyber security in the UK to his current advisory role. McGuinness reflected on his tenure in government service, focusing ...

Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era
Gary Savarino, Identity Strategist for APAC at SailPoint shares his recommendations for businesses to adopt a unified identity security approach to safeguard data.

Why API Security Is Crucial To Australia’s Financial Services Industry
Australia’s banking and financial services sector is undergoing a rapid digital transformation amidst a growing consumer appetite for convenient, fast and secure interactions and the emergence of open banking. A report by the Australian Banking Association revealed that 98.9% of bank transactions now take place digitally.
This shift to digitisation ...

The 2024 Ransomware Landscape: Looking Back On Another Painful Year
The ransomware landscape in 2024 showed increased activity and sophistication, with 75 active groups and a median ransom payment of USD $200,000. Top actors like RansomHub and Akira exploited vulnerabilities and adopted double/triple extortion tactics. Over 5,900 leak site posts highlight the scale of attacks, yet actual numbers are likely higher due ...

Better Collaboration Between Public and Private Sector
Toby Jones, Founder of TJC, speaks on the often misunderstood convergence between government and industry. The complexities and opportunities that arise when public and private sectors work together towards collective national security and defence. The convergence between government and industry, though seemingly fraught with challenges, is ...

Unmasking the Digital Puppet Masters
In a world where the line between truth and deception blurs with every click, the silent warriors of the digital realm rise to combat an unseen enemy. Malcolm Purcell, Vice President of APAC at Fivecast, unravels the tangled web of open-source intelligence (OSINT) and its pivotal role in upholding national security.The Digital Haystack: Easier Said ...
No results found.
In The News
Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365
SYDNEY, Australia - 16 October 2025 - An emerging, stealthy and persistent phishing-as-a-service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users, according to new research from Barracuda. Barracuda threat analysts have been tracking the new and rapidly evolving PhaaS since July 2025 and have named it Whisper ...
Trend Micro Named a Leader in Network Analysis and Visibility
SYDNEY, October 16, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) announced today that it has been named a Leader in Network Analysis and Visibility (NAV) solutions by Forrester. The analyst firm’s independent market evaluation scores the flagship Trend Vision One™ platform highest among all 12 evaluated solutions in the “current offering” ...
Banking scams up 65% globally in last year
SMS text-based phishing (smishing) surges by a factor of 10
ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation
Enhancements to Qualys ETM platform with integrated remediation help predict and prevent emerging threats to enable provable risk reduction for organisations
Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection
Bitdefender today announced the worldwide availability of GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) as a standalone solution, making its groundbreaking pre-emptive security technology available to all organisations regardless of their existing endpoint protection (EPP) or endpoint detection and response (EDR) platforms they ...
NetApp Transforms Enterprise Cloud with Google Cloud
Flexible and powerful block storage now available in Google Cloud NetApp Volumes, along with even greater AI integration for enterprise transformation
Verint Earns Top Recognition for AI Vision and Capability in CrayonIQ’s Inaugural APAC Contact Centre CX Platforms with AI Buyers Guide
CX Automation Pioneer Named an “Enterprise Transformer” in Asia Pacific
NetApp First to Embed Data Breach Detection into Enterprise Data Storage
New capabilities reinforce NetApp as the most secure storage on the planet
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
