The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why API Security Is Crucial to Australia’s Financial Services Industry

Why API Security Is Crucial to Australia’s Financial Services Industry

Australia’s banking and financial services sector is undergoing a rapid digital transformation amidst a growing consumer appetite for convenient, fast and secure interactions and the emergence of open banking. A report by the Australian Banking Association revealed that 98.9% of bank transactions now take place digitally. This shift to digitisation ...
The 2024 Ransomware Landscape: Looking Back on Another Painful Year

The 2024 Ransomware Landscape: Looking Back on Another Painful Year

The ransomware landscape in 2024 showed increased activity and sophistication, with 75 active groups and a median ransom payment of USD $200,000. Top actors like RansomHub and Akira exploited vulnerabilities and adopted double/triple extortion tactics. Over 5,900 leak site posts highlight the scale of attacks, yet actual numbers are likely higher due ...
Better Collaboration Between Public and Private Sector

Better Collaboration Between Public and Private Sector

Toby Jones, Founder of TJC, speaks on the often misunderstood convergence between government and industry. The complexities and opportunities that arise when public and private sectors work together towards collective national security and defence. The convergence between government and industry, though seemingly fraught with challenges, is ...
Unmasking the Digital Puppet Masters

Unmasking the Digital Puppet Masters

In a world where the line between truth and deception blurs with every click, the silent warriors of the digital realm rise to combat an unseen enemy. Malcolm Purcell, Vice President of APAC at Fivecast, unravels the tangled web of open-source intelligence (OSINT) and its pivotal role in upholding national security.The Digital Haystack: Easier Said ...
Why Our Cybersecurity Defences Are Crumbling

Why Our Cybersecurity Defences Are Crumbling

According to Michael Loewy, Co-Founder of Tide and a veteran in the field of cybersecurity, the reality is that our cybersecurity defences are crumbling."The industry is broken," he declares.What's broken about it?"Just open the news," he urges, pointing to the incessant barrage of headlines detailing mass data breaches and ...
From Reactive to Proactive Defence in Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers the Unknown

From Reactive to Proactive Defence in Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers the Unknown

Nadir Izrael, Co-Founder & CTO, Armis explains how AI-powered threat intelligence can better protect critical infrastructure and national security, as Australian organisations face enhanced cyber security obligations.
Data Privacy Day – Qualys Shares Insights for Effective Data Security

Data Privacy Day – Qualys Shares Insights for Effective Data Security

Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.
Phishing-as-a-Service (PhaaS) Kits Growing in Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) Kits Growing in Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly complex and sophisticated. The developers behind these phishing kits invest ...
No results found.

In the News

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers With Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers With Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

New Industry Analyst Study Shows that JFrog Delivered 282% ROI in Three Years, Reducing Risk While Accelerating Safer Software Releases for Enterprises
Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos today announced Sophos Workspace Protection, expanding its portfolio to help organisations secure hybrid work and govern the use of emerging technologies, including AI. Built around the Sophos Protected Browser, powered by Island, the solution enables organisations to protect applications, data, users, and guests wherever work takes place, while ...
Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Weaponised AI and the cyber arms race
Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

A new model for continuous, verified trust across every identity, every interaction, and every environment
Lenovo Releases New AI Inferencing Servers

Lenovo Releases New AI Inferencing Servers

Lenovo announced a suite of purpose-built enterprise servers, solutions and services for AI inferencing workloads expanding the Lenovo Hybrid AI Advantage portfolio. Setting the stage for the next era of AI, Lenovo is advancing the field of inferencing and eliminating hurdles to power real-world AI use cases ranging from storefront customer ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This