The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Ransom Data Should Be Made Public
The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.

Cybersecurity in the Age of AI
Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum
The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...

The Role Of Data Resilience In AI And Cybersecurity
Good AI and Cybersecurity Relies On Resilient Data
General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...

Cyber-insecurity – The Contact Centre Challenge (and Solution)
Introduction
Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare
Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems
Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI
Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
No results found.
In The News
The Machine Identity Gap: Only 28% of Australian Firms Ready for Secure AI
Delinea research finds Australia ranks lowest in AI security readiness. Businesses are also worried about the high level of shadow AI.
Quorum Cyber Reveals New Cybercriminal Tactics in Mid-Year Global Cyber Risk Outlook Report
“What we’ve seen in H1 2025 is both striking and sobering. The sheer volume of new entrants, more than 70 new threat groups and MaaS offerings, highlights the unyielding pace of cybercriminal innovation,” says Paul Caiazzo, Quorum Cyber’s Chief Threat Officer. “As we move into the latter half of 2025, we anticipate further innovation in social ...
Nasdaq Verafin and BioCatch Form Strategic Partnership to Accelerate the Global Fight Against Financial Crime
Partnership combines industry-leading consortium data and behavioral intelligence to bolster financial institutions’ defense against fraud
Check Point Expands Harmony SASE with Enterprise Browser, Delivering Zero Trust to Any Device
Enterprise Browser secures access on unmanaged devices without compromising compliance or productivity
Palo Alto Networks Unveils Protection for Highly Evasive Threats with Prisma Browser, Extending SASE Leadership
Prisma SASE 4.0 protects against highly evasive threats that assemble inside the browser, offers AI-augmented data classification, and secures today's dynamic private applications. Scaling SASE beyond $1.3B in ARR,[1] providing best-in-class security to one-third of the Fortune 500.
SailPoint and HCLTech Forge Partnership to Deliver Modern Identity Security at Enterprise Scale In the Age of AI
HCLTech named a SailPoint Global Delivery Admiral Partner for deep domain expertise, proven delivery methods, and commitment to governance, compliance and security excellence
Claroty Named to Forbes Cloud 100 for Fourth Consecutive Year
Claroty, the world’s leading cybersecurity company for cyber-physical systems (CPS) protection, has been listed on the Forbes 2025 Cloud 100 for the fourth consecutive year.
Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland
Brisbane, 5 September 2025 - In a significant step forward for sovereign cyber defence, The Hon. Steven Minnikin MP, Minister for Customer Services and Open Data and Minister for Small and Family Business, has officially opened Queensland headquartered Cube Cyber’s new Security Operations Centre (SOC) in Brisbane.
The Cube Cyber centre represents a ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
