The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Better Collaboration Between Public and Private Sector
Toby Jones, Founder of TJC, speaks on the often misunderstood convergence between government and industry. The complexities and opportunities that arise when public and private sectors work together towards collective national security and defence. The convergence between government and industry, though seemingly fraught with challenges, is ...

Unmasking the Digital Puppet Masters
In a world where the line between truth and deception blurs with every click, the silent warriors of the digital realm rise to combat an unseen enemy. Malcolm Purcell, Vice President of APAC at Fivecast, unravels the tangled web of open-source intelligence (OSINT) and its pivotal role in upholding national security.The Digital Haystack: Easier Said ...

Why Our Cybersecurity Defences Are Crumbling
According to Michael Loewy, Co-Founder of Tide and a veteran in the field of cybersecurity, the reality is that our cybersecurity defences are crumbling."The industry is broken," he declares.What's broken about it?"Just open the news," he urges, pointing to the incessant barrage of headlines detailing mass data breaches and ...

From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown
Nadir Izrael, Co-Founder & CTO, Armis explains how AI-powered threat intelligence can better protect critical infrastructure and national security, as Australian organisations face enhanced cyber security obligations.

Data Privacy Day – Qualys Shares Insights For Effective Data Security
Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.
Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection
Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns.
The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly complex and sophisticated. The developers behind these phishing kits invest ...

Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy
Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.

Cybersecurity In 2025: What Will And Needs To Transpire
In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand ...
In The News
Nozomi Networks Named a Leader in the 2025 Gartner® Magic Quadrant™ for CPS Protection Platforms
Company Recognised for Ability to Execute, and Completeness of Vision
Tenable Strengthens Its Identity Exposure Capabilities to Protect Against Compromises – Tenable Identity Exposure addresses identity sprawl security challenges with 360-degree visibility into identity risk
Tenable®, the exposure management company, today announced the launch of Identity 360 and Exposure Center, two new Tenable Identity Exposure capabilities designed to help organisations pinpoint identity risks and take swift, targeted action to prevent identity-based attacks.
Identity management has become fragmented, leading to identity sprawl - a ...
Check Point Software Securing the Hyper-Connected World in a New Era of AI with AI-Driven Innovation and Real Security Platform
Check Point unveils AI-powered security advancements and earns #1 ranking in Miercom’s security benchmark
Check Point CloudGuard Recognised as a Leader Across Three Key GigaOm Radar Reports
Check Point CloudGuard recognised for superior performance in WAF & API security and threat prevention, showcasing robust cloud security solutions
Genetec Brings Cloud-Managed Vehicle-Centric Investigation System to Australia and New Zealand
AutoVu Cloudrunner combines advanced vehicle data analytics with a solar-powered ALPR camera to bolster public safety and streamline investigations.
Newgen Optimises Critical Business Processes for Movigo Group
Movigo Group selected Newgen for its unified and configurable claims management solution to replace their legacy system, which was causing manual work in claims handling, leading to inefficiencies.
Genetec Successfully Completes Australian Federal Government IRAP Assessment
Assessment enables Genetec to support Australian Government agencies and critical infrastructure providers with cloud-based physical security solutions
Ransomware Rises Fourfold In a Year of Complex Threats – Barracuda’s XDR Roundup 2024
In 2024, Barracuda Managed XDR logged many trillions of IT events to identify the critical security threats targeting organizations and neutralize malicious activity. Threat analysts in Barracuda Managed XDR’s Security Operations Center (SOC) have drawn on this unique dataset to highlight the most common ways threat actors tried — and ultimately failed ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..