The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Claroty 2025 Cyber Security Predictions

Claroty 2025 Cyber Security Predictions

The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an ...
AI Ethics: Developing AI models with intent, transparency and diversity

AI Ethics: Developing AI models with intent, transparency and diversity

As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a laundry list of ethical concerns.
Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.
The Role of Data And AI In Cyber Defence

The Role of Data And AI In Cyber Defence

With cyber-attacks are becoming increasingly sophisticated and frequent, there’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from automating threat detection, analysing vast amounts of data for anomalies, and responding to potential breaches in real-time as well as providing a more effective response which ...
Taking A Borderless Approach To Cybersecurity Governance

Taking A Borderless Approach To Cybersecurity Governance

Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all sectors. With attacks becoming more frequent and sophisticated, there’s a compelling need ...
Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices.
Addressing Lateral Movement Threats Against Australian Entities

Addressing Lateral Movement Threats Against Australian Entities

With Australian and international authorities calling out lateral movement incidents multiple times this year, it’s clearly an area where improvements are being urgently sought. A key trend to gain momentum this year was the issuance of multi-country-led advisories outlining the tradecraft of threat groups striking both Australian and allied ...
Top Ten List: Reasons to Use Microsegmentation

Top Ten List: Reasons to Use Microsegmentation

Learn the top 10 reasons to implement microsegmentation in your cybersecurity strategy. Protect against malware, ransomware, and insider threats today.
No results found.

In The News

ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

New Capabilities in Log360 Tackle False Positives, Keep Threat Coverage Current, and Enable Scaling With Enterprise Demand
Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity today announced multiple cyber resilience breakthroughs at the company’s Catalyst 1 Data Security Summit, extending its pioneering Five-Step Cyber Resilience Framework to companies and governments. These innovations include unmatched protection for compute, container, storage, and database workloads across the three leading hyperscale clouds, ...
New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

“To stay ahead of the curve, businesses across Australia and New Zealand need to prioritise reducing tool sprawl and data siloes so engineers can detect and resolve critical issues fast. With high-business impact outages costing up to $3 million per hour in lost revenue, organisations can no longer ignore the costs associated with maintaining the status quo.”
Arctic Wolf Enhances Threat Intelligence Plus to Strengthen Proactive Defense

Arctic Wolf Enhances Threat Intelligence Plus to Strengthen Proactive Defense

Sydney, Australia – Arctic Wolf®, a global leader in security operations, today announced enhancements to Arctic Wolf Threat Intelligence Plus, introducing a new capability that allows organisations to deploy a threat feed with the same high-fidelity indicators of compromise (IoCs) used by Arctic Wolf’s AI-powered Security Operations Center (SOC) ...
CyberArk Names Omer Grossman Chief Trust Officer and Head of CYBR Unit; Appoints Ariel Pisetzky as CIO

CyberArk Names Omer Grossman Chief Trust Officer and Head of CYBR Unit; Appoints Ariel Pisetzky as CIO

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced two executive appointments to strengthen its leadership team and support the company's growth and innovation strategy. Omer Grossman, who has served as CyberArk's Chief Information Officer since late 2022, has been appointed to the newly created role of Chief Trust ...
Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

AI-powered Risk-based Patching enables customers to identify, prioritize, and fix the vulnerabilities that matter most through a single unified platform
CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

System of autonomous agents reason, hunt, and take decisive action across the kill chain, supercharging analyst investigations and threat response
Ping Identity Shapes the Future of Enterprise Security With AI-Driven Trust Framework

Ping Identity Shapes the Future of Enterprise Security With AI-Driven Trust Framework

Safeguards Autonomous Agents While Keeping Humans in Control 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This