The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft
Watch the Interview
Biography
Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was ...

Under Attack: Exposing Upscale Hacktivist DDoS Tactics
This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.

Benjamin Lamont & Helen Schneider – Australian Federal Police
Watch the Interview
Biography
Benjamin (Ben) Lamont is the Manager of Technology Strategy and Data for the Australian Federal Police. He is responsible for developing the AFP Technology Strategy and associated roadmaps to address capability gaps and opportunities. Ben also oversees the development and deployment of the AFP’s information management, ...

How to Outsmart Ransomware and Build Resilience Within Your Organisation
Ransomware is growing more dangerous every day. Strains like LockBit 3.0 are leading the attack, while other groups like Clop, BlackCat/ALPHV, and Royal are constantly changing their strategies to catch businesses off guard. These ransomware groups have evolved their tactics, shifting from single to double and even triple extortion models. For example, ...

The Strategic Transformation of IT: From Cost Center to Business Catalyst
The perception of IT has undergone a remarkable transformation in recent years. What was once viewed primarily as a cost centre has transformed into a pivotal force driving business innovation and market leadership. This shift hasn’t just been about changing mindsets—it's about tangible results. Research shows that digital leaders deliver average ...

Mick Dunne – Chief Cybersecurity Advisor at Microsoft
Watch the Interview
Biography
Mick Dunne is the Chief Cybersecurity Advisor at Microsoft where he is focused on ensuring alignment between Microsoft and their customers on cybersecurity challenges, product roadmaps and long-term security needs. Mick and his team bring deep industry experience as former CISOs and CTOs to enable them to work with ...

Leigh Williams – CIO, Brisbane Catholic Education
Watch the Interview
Biography
Leigh is currently the Chief Information Officer for Brisbane Catholic Education, overseeing all digital, information and IT infrastructure for hundreds of locations and over 13,000 staff. As a passionate, published researcher and advocator in digital innovation and education, Leigh has led keynotes and workshops ...

Command Central: Holistic Control Room Design for Today’s Critical Infrastructure
This article highlights the urgent need for modern control rooms as our built environment becomes ever more connected. With renewable energy sources integrating into the grid, autonomous industrial vehicles on the move, and smart city advancements reshaping urban life, control rooms must evolve. Many existing control rooms suffer from cramped layouts, ...
No results found.
In the News
Riverbed Study Finds 92% of Decision Makers in the Financial Services Industry Agree That Improving Data Quality Is Critical to AI Success
Financial Services organisations lead with a strong ROI on AIOps initiatives but only 12% have AI projects fully deployed enterprise-wide, and a substantial 62% still remain in pilot or development stages
CISOs Driving Growth Through Cyber Resilience, but AI and Supply Chain Visibility Cause Lingering Gaps
February 12, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released its latest research report, Persona Spotlight: CISO (Chief Information Security Officer), part of the company’s ongoing research into how cybersecurity leaders are navigating an increasingly complex threat landscape ...
Genetec Advances Investigation Speed and Efficiency With Built for Enterprise Capabilities in Security Center SaaS
New investigation capabilities reduce investigation time from hours to minutes across complex, multi-site, and multi-vendor environments
Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organisation
Sophos has announced the acquisition of UK-based Arco Cyber, a cybersecurity assurance company dedicated to helping organisations improve their security posture while staying ahead of compliance requirements and emerging threats.
The acquisition is an important step in Sophos’ strategy to help organisations strengthen cybersecurity strategy and ...
Armis Launches Armis Centrix™ for Application Security to Secure the Code That Runs Organisations
Today’s application security landscape is overloaded with fragmented, static point solutions, each solving a piece of the puzzle but creating noise, inefficiencies, and blind spots. Armis Centrix™ for Application Security is an AI-powered solution for detection, contextualisation, and remediation.
NinjaOne Expands Platform With IT Asset Management to Reduce Cost and Risk
Today, announced NinjaOne IT Asset Management (ITAM), a new solution that gives IT teams complete visibility and control across their entire IT environment by unifying endpoint and asset management. Built natively into the NinjaOne platform, ITAM helps organisations extend the life of their assets, reduce costs, strengthen security, and improve ...
CrowdStrike Appoints Jonathon Dixon to Accelerate Growth and AI-Powered Cybersecurity Transformation Across the Japan and Asia Pacific Theater
Dixon brings more than two decades of cybersecurity and IT leadership experience as new JAPAC vice president and managing director; will drive Falcon platform adoption to modernize cybersecurity across the region
Cisco Launches Breakthrough Innovations for the AI Era
The new Cisco Silicon One G300 switch silicon can power gigawatt-scale AI clusters for training, inference, and real-time agentic workloads, while maximizing GPU utilization with a 28% improvement in job completion time. | New AgenticOps innovations across networking, security, and observability further transform how IT teams reduce complexity ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
