The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Generative AI: Striking a Balance between Innovation and Overreliance
The threats posed by AI are distinct in many ways from those that target user identity, software code, or business data. While traditional cybersecurity risks often focus on protecting specific assets, AI introduces new challenges - such as hallucinations, deepfakes, and ethical concerns - that can impact decision-making and public trust. The key for ...

Bridging AI Readiness in Australia
With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.

Private Satellites, Public Dangers: Be Alarmed!
Introduction
Can governments and large businesses rely on private Starlink-type networks? In pursuing global connectivity and broader reach, many may overlook the risks associated with private satellite networks. The emergence of private satellite internet networks, led by Starlink and its expanding roster of competitors, has sparked debate about ...

How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025
Ruma Balasubramanian at Check Point Software Technologies provides advice on fostering an inclusive workplace this International Women's Day 2025.

Compliance In Healthcare is Not a Security Strategy
Australia’s healthcare sector is failing at cybersecurity. The latest MediSecure breach, compromising the data of 12.9 million Australians, isn’t an isolated incident—it’s a symptom of a much larger, systemic problem. The industry’s outdated, compliance-driven approach to security is not working. Without a fundamental shift towards data-centric ...

A Supercharged Security Culture is Needed to Navigate Australia’s Cybersecurity Rules
By focusing on an organisation-wide security culture, CISOs can best prepare to meet burgeoning security requirements. Being able to prove the effectiveness of their program with easy-to-understand scoring is also invaluable in maintaining trust, ongoing budget and funding.

The Feminine Firewall: Securing Cyberspace with Heart and Smarts
Introduction
Diversity is the art of thinking independently together.
In ancient times, women played vital roles far beyond their local communities. From the powerful priestesses of Delphi in ancient Greece to strong leaders like Hatshepsut in Egypt, women were not just keepers of cultural heritage but also catalysts for meaningful change. Their ...

CISOs and the C-Suite: The Start of a Beautiful Relationship?
Introduction
Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at major corporations and government agencies in Australia have dominated headlines, forcing ...
No results found.
In The News
CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers
Veeam announced a new partnership with CrowdStrike to deliver centralised visibility of critical data and advanced threat detection through integration with the Veeam Data Platform. The jointly developed product integration creates a more secure environment for shared customers, helping identify threats before, during and after an attack to enable ...
SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security
This innovative tool leverages artificial intelligence (AI) to identify and explain vulnerabilities in custom Advanced Business Application Programming (ABAP) code, empowering SAP developers and security teams to remediate risks faster and more efficiently.
NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene
NinjaOne today announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so they can prioritise and verify the ...
CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security
CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security
Falcon platform secures the entire identity attack lifecycle – from initial access to privilege escalation and lateral movement – across hybrid environments; extends Charlotte AI Agentic Detection Triage to identity-based attacks
CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for XDR
Earns high overall scores across Key and Emerging Features categories, with perfect marks in Threat Detection, Cloud Security Integration, Unified Telemetry and Scalability criteria
Veeam And McKinsey Reveals Most Organisations Vastly Overestimate Their Resilience – Veeam’s New Data Resilience Maturity Model
In an era marked by escalating cyberattacks and costly IT outages, Veeam has unveiled the industry’s first Data Resilience Maturity Model (DRMM). The new framework empowers organisations to objectively assess their true resilience posture and take decisive, strategic action to close the gap between perception and reality to ensure their data is ...
New Enterprise-Ready SaaS Solution For Microsoft Entra ID Users
Veeam announced the launch of Veeam Data Cloud for Microsoft Entra ID. With Entra ID (formerly Azure AD) facing over 600 million attacks daily, protecting organizations’ digital identity has never been more critical. Veeam Data Cloud for Microsoft Entra ID is a Software-as-a-Service (SaaS) backup solution designed to simplify data resilience for Entra ...
Veeam Turns Data Protection Into AI Intelligence With New Integration For Anthropic’s MCP
Veeam announced a major leap forward in unlocking the value of enterprise backup data for artificial intelligence (AI). The company unveiled new capabilities that enable AI systems to securely access and utilise data stored in Veeam repositories — powered by support for the Model Context Protocol (MCP), an open standard developed by Anthropic.
This ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..