The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Role Of Data Resilience In AI And Cybersecurity
Good AI and Cybersecurity Relies On Resilient Data
General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...

Cyber-insecurity – The Contact Centre Challenge (and Solution)
Introduction
Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare
Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems
Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI
Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime
Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.

Rome was not Built in a Day. Security is not Built in a Day
Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology
Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
No results found.
In The News
Oracle Helps Customers Achieve Extreme Availability and Performance for Mission-Critical and Agentic AI Applications
With Oracle Globally Distributed Exadata Database on Exascale Infrastructure, customers can run distributed workloads of all types, including agentic AI, analytics, and transactional while lowering costs.
Transparent access to data and the industry’s broadest set of data distribution policies help customers address data sovereignty and performance ...
Fortinet Reports Second Quarter 2025 Financial Results
Highlights
Revenue grew 14 per cent year over year to US$1.63 billion
Billings grew 15 per cent year over year to US$1.78 billion (1)
Unified secure access service edge (SASE) annual recurring revenue (ARR) up 22 per cent and Security Operations ARR up 35 per cent, year over year (2)
GAAP operating margin of 28 per cent
Non-GAAP operating ...
Ransomware Attacks Surge in Australia: One in Three Hit Multiple Times – New Report
One in Three Australian Ransomware Victims Hit Multiple Times as Security Gaps Persist.
New International Research Shows Ransomware Thrives in Complex and Fragmented IT Security Environments.
F5 and Equinix Expand Partnership to Accelerate AI-Ready Infrastructure for Secure Global Application Delivery
New joint capabilities help enterprises deploy and secure distributed AI workloads and modern apps—without physical infrastructure overhead
Tenable Expands Exposure Management Platform to Secure Enterprise AI
Tenable AI Exposure gives organisations unprecedented visibility into and control over the use of widely adopted generative AI tools like ChatGPT Enterprise and Microsoft Copilot
KnowBe4 Deploys Additional Agentic Capabilities to Bolster Customers’ AI Defences
Sydney, Australia, 7 August 2025 –KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management (HRM), is proud to highlight the success of its customers in achieving remarkable transformations in their HRM programs. By leveraging KnowBe4’s HRM+ platform and advanced AI-driven products including AIDA ...
CrowdStrike Launches New Services to Secure AI Systems and Operationalize AI in the SOC
AI Systems Security Assessment and AI for SecOps Readiness expand CrowdStrike’s industry-leading AI Security Services portfolio, helping organizations reduce risk and stop breaches in the AI era
CrowdStrike Signal Delivers the Next Evolution of AI-Powered Threat Detection
Now GA, new self-learning detection engines surface threats undetectable for others – connecting subtle activity into prioritized leads to accelerate investigation, hunting, and response
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
