The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Keeping The Public Safe From Festive Scams
"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers.
One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...

When Post-Quantum Cryptography Is No Longer Post-Quantum
As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...

The Cisco Live 2024 Rundown Featuring Splunk
At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats
While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...

Antifragility – The Essential Strategy for Modern Cyber Defense
Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.

The Five Step Journey To Securing Australia’s Most Important Data Assets
Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and other financial entities, there’s additional motivation in the form ...

AI’s Transformative Role In Corporate Governance
Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, ...
No results found.
In The News
BeyondTrust Named a Leader in 2025 Gartner Magic Quadrant for Privileged Access Management
BeyondTrust positioned highest for Ability to Execute, combined with its Completeness of Vision, contributed to its position as a Leader in this year’s report
We believe placement in the Leaders Quadrant reflects BeyondTrust’s identity-first approach to protecting Paths to Privilege™ across hybrid, multicloud, and AI-driven environments
CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management
CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management1. Recognised as a Leader for the seventh consecutive time, CyberArk is positioned furthest in Completeness of Vision which, from the company's standpoint, reflects CyberArk's ...
Semperis Announces Midnight In The War Room: A Groundbreaking Cyberwar Documentary Featuring The World’s Leading Defenders And Reformed Hackers
The first-of-its-kind feature film delves into the high-stakes conflict between cyber attackers and defenders, revealing untold stories of CISOs - their heroism, resilience, and the human cost of cyber war.
Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365
SYDNEY, Australia - 16 October 2025 - An emerging, stealthy and persistent phishing-as-a-service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users, according to new research from Barracuda. Barracuda threat analysts have been tracking the new and rapidly evolving PhaaS since July 2025 and have named it Whisper ...
Trend Micro Named a Leader in Network Analysis and Visibility
SYDNEY, October 16, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) announced today that it has been named a Leader in Network Analysis and Visibility (NAV) solutions by Forrester. The analyst firm’s independent market evaluation scores the flagship Trend Vision One™ platform highest among all 12 evaluated solutions in the “current offering” ...
Banking scams up 65% globally in last year
SMS text-based phishing (smishing) surges by a factor of 10
ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation
Enhancements to Qualys ETM platform with integrated remediation help predict and prevent emerging threats to enable provable risk reduction for organisations
Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection
Bitdefender today announced the worldwide availability of GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) as a standalone solution, making its groundbreaking pre-emptive security technology available to all organisations regardless of their existing endpoint protection (EPP) or endpoint detection and response (EDR) platforms they ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
