The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Invisible Battlefield: The “Grey Zone” Warfare Threatening Global Stability

The Invisible Battlefield: The “Grey Zone” Warfare Threatening Global Stability

Recently, KBI.Media was included in the AUKUS Advanced Technology Dialogue here in Australia across Sydney and Canberra. Some of the dialogue is not allowed to be publicised, but some which can be shared premiered on podcast, KBKast. Former Deputy Director for Mission Integration at ODNI, Beth Sanner, made clear on an alarming but largely unseen ...
2025 Cybersecurity Predictions by Qualys

2025 Cybersecurity Predictions by Qualys

Richard Seiersen, Chief Risk Tech Officer at Qualys shares six key predictions for the cybersecurity industry in 2025.
2025 Cybersecurity Predictions by CyberArk

2025 Cybersecurity Predictions by CyberArk

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. Thomas Fikentscher, CyberArk’s Area Vice President for ...
How Breach Readiness Will Shape Cyber Defense in 2025

How Breach Readiness Will Shape Cyber Defense in 2025

Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.
AI Domination and Quantum Computing on the Horizon

AI Domination and Quantum Computing on the Horizon

Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...
Human-centric Cybersecurity: The First Line of Defence

Human-centric Cybersecurity: The First Line of Defence

Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities. A New Approach Enter ...
Keeping the Public Safe From Festive Scams

Keeping the Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum cryptography Is No Longer Post-Quantum

When Post-Quantum cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
No results found.

In the News

DigiCert Forecasts the Security Priorities Poised to Define 2026 

DigiCert Forecasts the Security Priorities Poised to Define 2026 

From AI to quantum, eight tech predictions that show what organisations must brace for next year
NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne recently announced that it has been recognised as a Leader in two IDC MarketScape reports: Worldwide Unified Endpoint Management Software for Small and Medium Businesses (doc # US53003425, December 2025) Worldwide Client Endpoint Management Software for Windows Device Management (doc # US53002925, December 2025) NinjaOne was also ...
Vantage Markets Recognised for Real-time Threat Intelligence Collaboration With Trend Micro

Vantage Markets Recognised for Real-time Threat Intelligence Collaboration With Trend Micro

Innovation Partnership Award highlights deep collaboration, real-time intelligence sharing, and advanced security deployment across one of Australia’s leading financial trading platforms
The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

New Infoblox Threat Intel research finds that over 90 per cent of visits to parked domains now redirect users to malicious content, reversing a decade old risk profile.
Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Study shows verified brand identities in email protect consumers from phishing while driving higher engagement and brand credibility during peak online shopping season and beyond
Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory With NVIDIA

Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory With NVIDIA

Collaboration integrates firewalling, segmentation, and policy enforcement directly into NVIDIA BlueField-accelerated infrastructure for higher performance, stronger isolation, and simpler operations
Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated cybercriminal collective, and Mustang Panda, which Sophos X-Ops tracks ...
Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across telecommunications, cloud, cybersecurity, and data centres. Clifton, who after nearly 15 years in senior leadership, including more than a decade leading Macquarie Telecom, has ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This