The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Conversations Boards Should Have About Cybersecurity
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...

Advancing Security and Resilience: Insights from AWS Summit in Sydney
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia
AI - An Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1
From the late 1940s through the 1970s, the concept of software development has its’ origins in ...

‘Captivity Clouds’ – A Trap For Modern Day Security Leaders
Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily ...

Prioritise Foundational Cloud Security Before Leveraging Generative AI
An article around how to prioritise foundational cloud security before leveraging Generative AI.

How Data Quality Is Limiting Your Organisation’s AI Success
Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more than that. We’re now living in a world where holding onto too much data could get you ...

Cybersecurity Budgets and Readiness – Are we there yet?
In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver ...
No results found.
In The News
Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools
29 April 2025: Logicalis, the leading global technology service provider, has revealed that chief information officers (CIOs) are struggling to derive value from security investments amid an expanding threat landscape according to its annual CIO Report. Logicalis surveyed 1,000 global IT leaders, including more than 300 from Asia Pacific (APAC), ...
BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™
Complimentary new assessment--powered by Identity Security Insights--provides actionable recommendations to secure against vulnerabilities and help organisations tackle identity threats
New assessment quickly reveals hidden Paths to Privilege, employing AI-based detection, and provides an initial set of prioritised findings to help guide security decisions
Palo Alto Networks Cortex XSIAM Delivers Industry’s First AI-Driven SecOps Platform to Span Proactive and Reactive Security
Evolves industry-leading capabilities with AI-driven Cortex Exposure management and Advanced Email Security
CrowdStrike Delivers Industry-First Managed Threat Hunting Across Third-Party Data
Falcon Adversary OverWatch now hunts across third-party data in Falcon Next-Gen SIEM, extending expert-driven detection across every attack surface to stop stealthy adversaries
ColorTokens Highlighted Among Top Providers of Microsegmentation Technology by Industry Experts, Paving the Way for Continued Success in 2025
ColorTokens Announces Key Achievements and Industry Accolades in 2025; Named “Visionary Vendor” by EMA, Recognized as Leader by GigaOm, and Awarded Four Globee Cybersecurity Awards.
Cisco Continues to Drive Innovation to Reimagine Security for the AI Era
New Cisco innovations address the complexities for security professionals to embrace the AI era in today’s dynamic threat landscape
Cisco XDR and Splunk Security advancements simplify threat detection and response with cutting edge agentic AI
Cisco and ServiceNow deepen partnership to ensure customers can efficiently adopt and scale AI ...
Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale
Cisco and ServiceNow deepen partnership to ensure customers can adopt and scale AI securely and efficiently.
Companies will bring portfolios closer together to help enterprises evolve their organizations as they embrace AI.
First planned integration will tackle AI security and risk with Cisco AI Defense and ServiceNow’s Security Operations ...
Qualys Unveils Policy Audit with Enhanced Efficiency for Continuous Audit Readiness
Enhancements streamline evidence collection, prioritise risk-based remediation, and ensure continuous audit readiness, helping organisations reduce compliance costs and regulatory exposure
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..