The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Tackling Takedowns – How to Mitigate Risks of Fake Domains

Tackling Takedowns – How to Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – the Late Bloomer

Oracle Cloud – the Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...
Identity Platforms Are No Longer Just a Backend Issue

Identity Platforms Are No Longer Just a Backend Issue

Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson, Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...
The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.
Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles

Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...
Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025

Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025

Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...
Cyber Resilience in Focus: Five Areas Every Board Must Prioritise

Cyber Resilience in Focus: Five Areas Every Board Must Prioritise

Boards need a robust risk management program and have to foster a cyber-aware culture throughout the organisation starting from the very top to help drive cyber maturity.
No results found.

In the News

Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated cybercriminal collective, and Mustang Panda, which Sophos X-Ops tracks ...
Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across telecommunications, cloud, cybersecurity, and data centres. Clifton, who after nearly 15 years in senior leadership, including more than a decade leading Macquarie Telecom, has ...
Kyndryl Unveils Quantum Safe Assessment Service to Enable Enterprise Readiness for the Quantum Era

Kyndryl Unveils Quantum Safe Assessment Service to Enable Enterprise Readiness for the Quantum Era

New service helps organisations identify cryptographic vulnerabilities and build scalable post-quantum strategies
Cloudflare Publishes Top Internet Trends for 2025

Cloudflare Publishes Top Internet Trends for 2025

Intensifying bot wars, a sharp rise in attacks on civil society organisations, and rapid progress in post-quantum encryption mark a pivotal year online. 
GitHub: Australian Public Sector AI Adoption to Expand in 2026, ROI Takes Centre Stage

GitHub: Australian Public Sector AI Adoption to Expand in 2026, ROI Takes Centre Stage

Sharryn Napier, VP, GitHub, shares her predictions for 2026 in the wake of 2 million+ developers in Australia now building on the platform and as the government announces its National AI Plan.
DroneShield Secures $49.6M European Military Contract

DroneShield Secures $49.6M European Military Contract

DroneShield Limited (ASX:DRO) has announced it has received a contract for $49.6 million from an in-region European reseller that is contractually required to distribute the products to a European military end-customer. The contract is for handheld counter-drone systems, associated accessories, and software updates. DroneShield has a large portion of ...
CrowdStrike Announces the General Availability of Falcon AI Detection and Response to Secure the New AI Attack Surface

CrowdStrike Announces the General Availability of Falcon AI Detection and Response to Secure the New AI Attack Surface

With unified AI prompt-layer protection, CrowdStrike secures enterprise AI everywhere it happens – from development through workforce usage
Tenable Research Finds No-Code Agentic AI Can Be Used for Financial Fraud and Workflow Hijacking

Tenable Research Finds No-Code Agentic AI Can Be Used for Financial Fraud and Workflow Hijacking

New findings demonstrate how democratised AI tools like Microsoft Copilot Studio can inadvertently leak sensitive data and execute unauthorised financial actions
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This