The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Breaking Down Barriers to Cybersecurity Frameworks
Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s Essential Eight, effectively.
The complexity of deployment, the need for a cultural ...

Security is Not a Zero-Sum Game
The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong and when they do - our whole world turns with it.
Jeetu Patel, Executive Vice President & Chief Product Officer at Cisco, discussed his strong stance against monopolies in the tech industry and his view on collaboration and ...

The Urgency of Real-Time Cyber Asset Risk Reporting: A New Standard in Cybersecurity
The article talks to the importance and urgency of Real-Time Cyber Asset Risk Reporting in today’s threat landscape. It highlights Australian statistics, touching on increases in attack frequency, targeted industries, and the financial impact on Australian businesses, and how Australian business may be lagging behind in their defences, and touches on ...

Scams and The Critical Role for Australian Banks
Scams and frauds are prevalent in the banking sector, with cybercriminals becoming ever more sophisticated in their tactics. According to Australian Competition & Consumer Commission's report Australians lost AUD $2.74 billion to scams in 2023 - although this was a welcome decline compared to 2022 (AU$3.15 billion lost) it is still alarmingly ...

Sustainability in Business is More than a Reusable Coffee Cup
When people hear sustainability, some might straight away think - oh yes a reusable coffee cup. Perhaps, however in this context we’re talking about sustainability within tech businesses and what does this mean and more importantly - what does that look like?Luke Hargreaves, Founder and CEO from Aquainnis chatted to me about the urgent need for ...

How To Quickly Kick Start Holistic SAP Security
SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.

Exclusive: Zero Trust Security – The way Forward for IT and Security
In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities
As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
No results found.
In The News
Bitdefender Enhances Global Channel Program for Resellers and Managed Service Providers
Bitdefender today announced major enhancements to its Partner Advantage Network – Reselling Channel Partner Program and Managed Service Provider (MSP) Partner Program. The updates are designed to maximise revenue opportunities, streamline partner engagement, and further strengthen support for the channel and MSP community. The program introduces a new ...
SailPoint Research Highlights Rapid AI Agent Adoption, Driving Urgent Need For Evolved Security
SailPoint, Inc. . (Nasdaq: SAIL), a leader in unified identity security for enterprises, today released a new research report titled ‘AI agents: The new attack surface. A global survey of security, IT professionals and executives.’ The report highlights an urgent need for improved identity security as AI agents gain widespread adoption.
69% of Organisations Breached by Ransomware Over Past Year, Delinea Report Finds
AI accelerates both attacks and defences, but critical security gaps persist
SYDNEY, May 29, 2025 - Delinea, a pioneering provider of solutions for securing human and machine identities through centralised authorisation, has unveiled new research highlighting how ransomware attacks have continued to surge over the past year, despite fewer victims ...
Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface
Veriti is the first to introduce pre-emptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments
Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises
AI security solution integrated with NVIDIA Enterprise AI Factory validated design
SYDNEY, MAY 20, 2025 – Global enterprise cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its bringing powerful and simplified security capabilities to NVIDIA Enterprise AI Factory validated design, helping organisations worldwide ...
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel
Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper
ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
Tenable Comment on ACSC’s joint advisory: Russian GRU targeting Western logistics entities and technology companies
Issued on 22 May 2025, a joint advisory from ASD’s ACSC, CISA, NSA, FBI and more than a dozen allied agencies warning that Russia’s GRU Unit 26165 (APT28/Fancy Bear) has been spying on Western logistics and technology firms supporting aid to Ukraine since 2022, using password-spray and spear-phishing campaigns plus exploits for Outlook, WinRAR, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..