The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Feminine Firewall: Securing Cyberspace With Heart and Smarts
Introduction
Diversity is the art of thinking independently together.
In ancient times, women played vital roles far beyond their local communities. From the powerful priestesses of Delphi in ancient Greece to strong leaders like Hatshepsut in Egypt, women were not just keepers of cultural heritage but also catalysts for meaningful change. Their ...

CISOs and the C-Suite: The Start of a Beautiful Relationship?
Introduction
Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at major corporations and government agencies in Australia have dominated headlines, forcing ...

The Role of Secure Information Architecture in Transforming Modern Workspaces
Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation Report, nearly one-third of organisations are dissatisfied with their IT infrastructure.1 ...

Same, Same but Not Different.
The first few weeks of the year signals the back to work influx, in many cases now also a return to the office, from the suburbs to the city. For the vast majority, even in 2025, it means back to the same desk and view surrounded by the same people who most likely did the same things during the 2025 Summer as they did during 2024 or any other summer ...

Building ExeQuantum: The Challenges of Innovating in a Market That Doesn’t Know It’s at Risk Yet
As the CEO of ExeQuantum, I spend my days immersed in the world of post-quantum cryptography (PQC), a space that feels both ahead of its time and painfully urgent. The irony is clear, while the quantum threat is rapidly approaching, most industries still treat security as an afterthought, something to worry about later. The frustrating part? "Later" ...

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms
Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.

What’s New in Microsegmentation in 2025
Know what microsegmentation vendors are offering in 2025 to boost zero trust strategies and counter advanced cyber threats.

The Four Horsemen of Emerging Tech: How Quantum Computing, AI, blockchain, and Cybersecurity Are Shaping the Future
The convergence of Quantum Computing, AI, Blockchain, and Cybersecurity is redefining the technological landscape. These interconnected innovations are revolutionizing industries and reshaping digital trust, security, and efficiency. Understanding their relationships is crucial for future preparedness.
No results found.
In the News
Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition
Operating independently as a wholly owned subsidiary, Nozomi Networks - which recently surpassed $100M in revenue - will continue delivering vendor agnostic OT/IoT cybersecurity solutions to its global customer and partner community.
LABYRINTH CHOLLIMA Evolves Into Three Adversaries
LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group.
GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their ...
New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed
ISACA’s 2026 State of Privacy survey report warns privacy risk is becoming a broader business issue as privacy resources tighten across the region.
DigiCert Releases Q4 2025 RADAR Brief
Heavy demand for online content and growing cyber threats defined the end of 2025
New Motorola Solutions AI Offerings Help Public Safety Agencies Reclaim Hours Every Day
Motorola Solutions has announced the launch of Assist Suites, a portfolio of role-based AI for public safety solutions designed to deliver the right intelligence to the right person at the right time. Assist Suites synthesise multiple sources of data from across an agency – 911 audio, body and in-car camera footage, radio transcripts and more – into a ...
xReality Group (ASX:XRG) Quarterly Activities Report
xReality Group (ASX:XRG) has announced its Quarterly Activities Report and Appendix 4C for the quarter ending 31st December 2025, together with an Operational Update.
Key Highlights:
Highest Cash Receipts to date
$7.4m in Q2 (up 85% QoQ)
$11.4m YTD (up 20% PcP)
Net Cash from Operations $3.1m
Global Individual Agencies ...
Mandiant Warns of Active ShinyHunters Vishing Campaign Targeting Enterprise Identity Systems
Mandiant, part of Google, is warning organisations of an active and ongoing cybercrime campaign attributed to actors operating under the ShinyHunters name, leveraging advanced voice phishing (vishing) techniques to compromise enterprise identity environments.
Mandiant has observed attackers using evolved social engineering methods to successfully ...
LevelBlue and Fortra Launch Strategic Managed Services Partnership to Accelerate Cybersecurity Innovation
Strategic partnership includes LevelBlue's acquisition of Fortra's Alert Logic Managed Detection and Response business, strengthening LevelBlue's position as a global MDR leader
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
