The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity In 2025: What Will And Needs To Transpire

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand ...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks, or "Tony" as I’ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel. Reynolds’ belief and metaphor he goes by is: ...
Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Cloud-Native Application Protection Platforms (CNAPPs) are a game changer in cloud security. CNAPPs are rapidly becoming the central nervous system of cloud defence, offering businesses a comprehensive solution to manage risk in today’s fast-changing digital environment.
The Unseen Powerhouse: 2020Partners

The Unseen Powerhouse: 2020Partners

As far as cybersecurity networks go, 2020Partners stands out—a private, non-commercial coalition of senior security professionals transcending conventional borders and limitations. Greg Sim is the Founding Partner of 2020Partners and the pioneer behind this exclusive network. "It’s not even a non-profit," Greg commented, referring to the networks ...
How Mobile Devices Became the Bad Guys’ Favourite Weapon

How Mobile Devices Became the Bad Guys’ Favourite Weapon

Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends - but most are unware their risks that ...
Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...
Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – The Late Bloomer

Oracle Cloud – The Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
No results found.

In The News

CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

Machine identities outnumber human identities by 82 to 1. Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges. CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens today reaffirmed its commitment to the Australian market including federal, state, and local government agencies, regulated industries, critical infrastructure operators, and enterprises.
Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

87 per cent of cybersecurity professionals expect artificial intelligence to enhance their roles, offering efficiency and relief amid cyber skill shortages, but they require upskilling to unlock full potential
Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering

Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering

Semperis' first-of-its-kind Ready1 for Identity Crisis Management combines market-leading hybrid identity recovery and crisis management to streamline out-of-band communications, reporting, and identity recovery
Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights

Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights

Sydney, Australia – 9 October, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all size business, has introduced Barracuda Research, a new centralised resource for threat intelligence, real-world incident analysis, email threat detection data from Barracuda AI, and more. ...
Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition

Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition

Sophos today announced it has been named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment (doc #US52997325, September 2025) report. The IDC MarketScape for Extended Detection and Response cites Sophos’ protection capabilities as a strength, noting, “Sophos is viewed favourably in terms ...
WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns

WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns

If you’ve ever wondered how someone could lose access to their WhatsApp account in a matter of seconds, the answer lies in cleverly crafted scams. Cybercriminals don’t need advanced malware or sophisticated hacking tools – instead they exploit trust, urgency, and empathy. Bitdefender Labs has been monitoring a rapidly expanding campaign that ...
Kaseya Acquires Leading AI-Powered Email Security Provider INKY

Kaseya Acquires Leading AI-Powered Email Security Provider INKY

Acquisition strengthens Kaseya’s end-to-end cybersecurity platform and advances Kaseya 365 User with next-generation, AI-driven email protection.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This