The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most cyber secure nation by 2030. However, according to Apple, Australia is one of the top four countries for cyber-attacks - behind the US, the UK and Canada. With the government playing an increasingly proactive, and prominent role in ...
Robust Physical Security Includes Strong Data Privacy 

Robust Physical Security Includes Strong Data Privacy 

Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue technologies, towards modern digital infrastructure. At the same time, governments and citizens have become increasingly concerned about privacy implications.
Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Introduction Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity industry. In this article, we will delve into the dynamics of M&A within the cybersecurity sector, exploring both successful and unsuccessful instances. Additionally, we will provide insights for start-up and mid-market businesses ...
The New Ransomware Threat Targeting Global Institutions

The New Ransomware Threat Targeting Global Institutions

The British Library falls victim to Rhysida, a ransomware group employing a "double extortion" tactic. With global ambitions and sophisticated techniques, Rhysida poses a significant threat to institutions worldwide. The rise of ransomware payments and cybercriminal sophistication is cause for concern. Stay tuned for more on Rhysida in our upcoming ...
Future of Work Predictions 2024

Future of Work Predictions 2024

With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year. Prediction: AI Will Be Your Best Work Buddy One of the most exciting ideas for workplace productivity is the deployment of AI assistants that help employees become — and continue to be — efficient and effective. For example, ...
A Human Centric Tech Revolution in 2024

A Human Centric Tech Revolution in 2024

With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence. Work Needs To Revolve Around Humans, Not The Other Way Around Productivity ...
Businesses Need To Rewrite Their Identity Security Playbook For 2024

Businesses Need To Rewrite Their Identity Security Playbook For 2024

With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...

Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel

In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President & Chief Product Officer, shed light on the company's significant announcements and the profound advancements in the field of cybersecurity. Patel's insights underscore the pivotal role of artificial intelligence (AI) in revolutionising security, carving a ...
No results found.

In The News

For the Third Consecutive Year, Check Point Software Demonstrates Industry’s Highest Threat Prevention Rate in Miercom’s Enterprise and Hybrid Mesh Firewall Security Report

For the Third Consecutive Year, Check Point Software Demonstrates Industry’s Highest Threat Prevention Rate in Miercom’s Enterprise and Hybrid Mesh Firewall Security Report

Check Point’s Infinity Platform offers the best protection against the latest generation of cyberattacks, with a block rate of 99.9% on new malware, 99.7% phishing prevention rate, and 98% average block rate on high & critical intrusion events
Rapid GenAI Application Adoption Drives New Era of Application and Infrastructure Modernisation

Rapid GenAI Application Adoption Drives New Era of Application and Infrastructure Modernisation

Nutanix study reveals that GenAI is changing organisations priorities, with security and privacy being a primary concern
Pax8 Adds Foxit’s Innovative PDF and eSignature Solutions to its Cloud Marketplace

Pax8 Adds Foxit’s Innovative PDF and eSignature Solutions to its Cloud Marketplace

SYDNEY, AU (February 6, 2025) – Pax8, the leading cloud commerce marketplace, has added new offerings to the Pax8 Marketplace from Foxit, a leading provider of innovative PDF and eSignature products and services. With Foxit's advanced document management technology now available in the marketplace, Pax8’s global network of partners can now access ...
Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads

Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads

Bitdefender Labs has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers. LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its ...
Tenable Comment on DeepSeek Ban In AU Government

Tenable Comment on DeepSeek Ban In AU Government

Governments in the U.S, Italy, and now Australia have moved to ban access to DeepSeek, a Chinese-developed large language model (LLM), on government devices. These bans stem from concerns over data security and the potential exposure of sensitive information to the PRC. However, blocking access to DeepSeek is not as simple as restricting its website ...
Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers

Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers

Kyndryl’s end-to-end SASE services will help customers drive adoption of Palo Alto Networks’ cloud-first, zero-trust solution for network security
CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

Mutual customers will benefit from boosted endpoint threat detection and response capabilities
Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Unified security and observability enable continuous compliance and response automation for major cloud platforms LAS VEGAS, NV, February 4, 2025 – Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This