The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats

Akamai Unveils Defenders’ Guide 2025 to Better Equip APJ Cybersecurity Teams Against Evolving Threats

Akamai Technologies (NASDAQ: AKAM), the cybersecurity and cloud computing company that powers and protects business online, today announced the release of the Defenders’ Guide 2025: Fortify the Future of Your Defense. This first-of-its-kind State of the Internet (SOTI) report delivers practical research around risk management to identify, assess, and ...
Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade

Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade

Watch the Interview  Biography As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about harnessing the power of Open Source, demonstrated through his leadership roles at OpenUK ...
Why Is Energy Monitoring Technology so Important for Achieving Sustainability Goals?

Why Is Energy Monitoring Technology so Important for Achieving Sustainability Goals?

While many organisations are setting ambitious goals (planning for decarbonisation, cleaner electrification or other reductions in emissions) they are failing to implement the tech to make them a reality.
Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch the Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...
The End of Pentest Reporting Chaos: OWASP Standardises the Industry

The End of Pentest Reporting Chaos: OWASP Standardises the Industry

For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...
2024 Lessons Shaping 2025 Cybersecurity Trends

2024 Lessons Shaping 2025 Cybersecurity Trends

Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.
Navigating and Combatting Scams in Banking

Navigating and Combatting Scams in Banking

By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.
The Two Forces Reshaping Our Cyber Defences for the Better

The Two Forces Reshaping Our Cyber Defences for the Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
No results found.

In the News

Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

Quorum Cyber’s 2026 Global Cyber Risk Outlook Reveals Cyber Crime Enters an Industrial Phase

The number of newly formed ransomware groups increased by 30% in the year to October 2025 Global vulnerability disclosures rose 21%, surpassing 35,000 Early evidence of a nation-state group using AI agents to automate up to 90% of an intrusion Cybercriminals are increasingly shifting away from encryption toward faster, lower-cost data exfiltration ...
One-click Cyber Flaw Found in CCTV Software Protecting Australia’s Critical Infrastructure

One-click Cyber Flaw Found in CCTV Software Protecting Australia’s Critical Infrastructure

SUMMARY - New Architecture, New Risks: One-Click to Pwn IDIS IP Cameras As part of our ongoing research into modern cloud-enabled surveillance ecosystems, we turned our attention to a major vendor in the surveillance domain, IDIS. IDIS is a global video surveillance manufacturer headquartered in South Korea. IDIS manufactures an end-to-end solution of ...
Netpoleon and Hack the Box Partner to Strengthen Cybersecurity Skills Across Australia and New Zealand

Netpoleon and Hack the Box Partner to Strengthen Cybersecurity Skills Across Australia and New Zealand

Sydney, Australia – February 3rd – Netpoleon, a leading value-added distributor of cybersecurity and networking solutions across Asia Pacific, has announced a strategic partnership with Hack The Box (HTB) to deliver advanced cybersecurity education and workforce development solutions to organisations across Australia and New Zealand. The partnership ...
Dynatrace Expands Cloud Operations Capabilities With New Integrations Across AWS, Azure, and Google Cloud

Dynatrace Expands Cloud Operations Capabilities With New Integrations Across AWS, Azure, and Google Cloud

New cloud-native integrations give enterprises a clearer, unified view across multi-cloud environments
Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Nozomi Networks Enters Next Phase of Growth as Mitsubishi Electric Completes Acquisition

Operating independently as a wholly owned subsidiary, Nozomi Networks - which recently surpassed $100M in revenue - will continue delivering vendor agnostic OT/IoT cybersecurity solutions to its global customer and partner community.
LABYRINTH CHOLLIMA Evolves Into Three Adversaries

LABYRINTH CHOLLIMA Evolves Into Three Adversaries

LABYRINTH CHOLLIMA has evolved into three distinct adversaries with specialized malware, objectives, and tradecraft: GOLDEN CHOLLIMA and PRESSURE CHOLLIMA now likely operate separately from the core LABYRINTH CHOLLIMA group. GOLDEN CHOLLIMA and PRESSURE CHOLLIMA target cryptocurrency entities and are distinguished by the scale and scope of their ...
New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

New ISACA Study: Privacy Teams Are Shrinking, Increasingly Stressed

ISACA’s 2026 State of Privacy survey report warns privacy risk is becoming a broader business issue as privacy resources tighten across the region.
DigiCert Releases Q4 2025 RADAR Brief

DigiCert Releases Q4 2025 RADAR Brief

Heavy demand for online content and growing cyber threats defined the end of 2025 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This