The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Evolving Threat Landscape Facing Australia’s Banks

The Evolving Threat Landscape Facing Australia’s Banks

The increasing reliance on digital and mobile banking has created new opportunities for fraudsters. While digital banking offers convenience and efficiency, it also introduces new vulnerabilities. The move away from in-person interactions has made it easier for cybercriminals to target individuals and carry out fraudulent activities online.
Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturity—and individual developer security skills—will be paramount in facilitating the right growth and knowledge building.
Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
No results found.

In The News

Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Redwood City, CA – September 2, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of Brett Theiss as Chief Marketing Officer (CMO). As CMO, Theiss will shape and accelerate Check Point’s global growth agenda, strengthening brand presence, fuelling ...
Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

SYDNEY, Australia – 4 September 2025 – Barracuda threat analysts have published a report on the latest techniques being used by the Tycoon phishing-as-a-service (PhaaS) kit to hide malicious links in emails. The techniques are designed to obscure, muddle and disrupt the structure of links, or URLs, with the aim of confusing automated detection systems ...
Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, and Windows ...
Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos has announced that its endpoint Solution is now natively integrated and automatically included in all Taegis™ Extended Detection and Response (XDR) and Taegis Managed Detection and Response (MDR) subscriptions. This milestone gives customers immediate access to combined prevention, detection, and response capabilities in a single platform – ...
BT Enters Agreement with TNS for the Sale of its Radianz Business

BT Enters Agreement with TNS for the Sale of its Radianz Business

BT and Transaction Network Services (TNS) today announced that TNS has agreed to acquire BT’s Radianz business. The transaction is expected to complete during the first half of 2026, subject to customary closing conditions, including regulatory clearance.
McLaren Racing Announces Trend Micro as an Official Partner of the McLaren Formula 1 Team 

McLaren Racing Announces Trend Micro as an Official Partner of the McLaren Formula 1 Team 

Highw-performance alliance built to stay ahead, on track and in cybersecurity
Check Point Software Technologies Appoints David Caspari as Managing Director for Australia & New Zealand (ANZ) to Drive Growth and Cyber Leadership

Check Point Software Technologies Appoints David Caspari as Managing Director for Australia & New Zealand (ANZ) to Drive Growth and Cyber Leadership

Sydney, Australia – September 3, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of industry leader David Caspari as Managing Director for Australia and New Zealand (ANZ). Caspari will lead Check Point’s business in the region, expanding customer and ...
ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape

ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape

ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This