The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Strategic Transformation of IT: From Cost Center to Business Catalyst

The Strategic Transformation of IT: From Cost Center to Business Catalyst

The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average ...
Mick Dunne – Chief Cybersecurity Advisor at Microsoft

Mick Dunne – Chief Cybersecurity Advisor at Microsoft

Watch the Interview  Biography Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team bring deep industry experience as former CISOs and CTOs to enable them to work with ...
Leigh Williams – CIO, Brisbane Catholic Education

Leigh Williams – CIO, Brisbane Catholic Education

Watch the Interview  Biography Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and advocator in digital innovation and education, Leigh has led keynotes and workshops ...
Command Central: Holistic Control Room Design for Today’s Critical Infrastructure

Command Central: Holistic Control Room Design for Today’s Critical Infrastructure

This article highlights the urgent need for modern control rooms as our built environment becomes ever more connected. With renewable energy sources integrating into the grid, autonomous industrial vehicles on the move, and smart city advancements reshaping urban life, control rooms must evolve. Many existing control rooms suffer from cramped layouts, ...
Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats

Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats

Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet (SOTI) report delivers practical research around risk management to identify, assess, and ...
Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade

Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade

Watch the Interview  Biography As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about harnessing the power of Open Source, demonstrated through his leadership roles at OpenUK ...
Why Is Energy Monitoring Technology so Important for Achieving Sustainability Goals?

Why Is Energy Monitoring Technology so Important for Achieving Sustainability Goals?

While many organisations are setting ambitious goals (planning for decarbonisation, cleaner electrification or other reductions in emissions) they are failing to implement the tech to make them a reality.
Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch the Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...
No results found.

In the News

Veeam Partners With ServiceNow to Power Data Resilience Processes and Workflows

Veeam Partners With ServiceNow to Power Data Resilience Processes and Workflows

New Veeam App helps organizations orchestrate and manage data protection for critical assets through ServiceNow, strengthening resilience and compliance Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the Veeam App for ServiceNow, which helps organizations to integrate the management and ...
CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike Achieves 100% Detection and 100% Protection in Most Challenging MITRE Evaluations

CrowdStrike embraces MITRE’s first real-world cross-domain attack simulation, delivering perfect scores with no false positives AUSTIN, Texas – December 10, 2025 – CrowdStrike (NASDAQ: CRWD) delivered 100% detection and 100% protection with no false positives in the 2025 MITRE ATT&CK® Enterprise Evaluations – the most technically demanding in ...
Wendy Komadina Appointed Darktrace VP ANZ to Spearhead Next Phase of Partner-Led Growth

Wendy Komadina Appointed Darktrace VP ANZ to Spearhead Next Phase of Partner-Led Growth

Darktrace is pleased to announce the appointment of highly respected Australian technology executive, Wendy Komadina, as Vice President, Australia and New Zealand (ANZ).
Trend Micro Honours Global Leaders in Cybersecurity With 2025 Global Customer Awards

Trend Micro Honours Global Leaders in Cybersecurity With 2025 Global Customer Awards

Vantage Markets was awarded Customer Innovator for going beyond standard cybersecurity implementations SYDNEY, December 11, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the recipients of its 2025 Trend Global Customer Awards, celebrating organisations worldwide for their corporate leadership, ...
New Research Reveals Australians and New Zealanders Are Ready for AI-Powered Emergency Response

New Research Reveals Australians and New Zealanders Are Ready for AI-Powered Emergency Response

86% willing to share real-time location data; strong support for AI to detect threats and accelerate response
Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex infection chain. The film, Leonardo DiCaprio's latest, has quickly gained notoriety, making it an attractive lure for cybercriminals seeking to infect as ...
Tenable Patch Tuesday Commentary – December 2025

Tenable Patch Tuesday Commentary – December 2025

In the last Patch Tuesday for 2025, Microsoft addresses 56 CVEs, including two publicly disclosed vulnerabilities and one zero-day that was exploited in the wild. Elevation of privilege (EoP) vulnerabilities accounted for 50% of the vulnerabilities patched this month, followed by remote code execution (RCE) vulnerabilities at 33.9%. Please find below a ...
CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Counter Adversary Operations identifies innocuous trigger words that lead DeepSeek to produce more vulnerable code.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This