The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australian Energy Sector Grappling with Rising Ransomware Threat

Australian Energy Sector Grappling with Rising Ransomware Threat

As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.
Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Eliminating Enterprise Risk: One Phishing-resistant User At a Time

Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
How to Innovate in a Privacy-Protective Way

How to Innovate in a Privacy-Protective Way

Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.
Leading Cybersecurity Tech Trends Driving change

Leading Cybersecurity Tech Trends Driving change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.
Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
No results found.

In The News

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

A new IDC InfoBrief, “Agentic Automation: Unlocking Seamless Orchestration for the Modern Enterprise”, sponsored by UiPath (NYSE: PATH), a global leader in agentic automation, has revealed 41% of Australian organisations are already using agentic AI and another 50% are planning to use it in the next six months.
CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

Recognition Cites CyberArk’s Innovation Focus, Platform Capabilities and Bold Vision 
Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Company positioned closest to the centre of the Radar, underscoring its ability to help customers understand their dynamic cloud environments beyond the capacity of competitive solutions
Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

ISACA, the global professional association supporting digital trust professionals, has announced the appointment of Australian cybersecurity expert Jamie Norton as Vice Chair of its 2025–2026 Board of Directors. Norton, currently Chief Information Security Officer (CISO) for the Australian Securities and Investments Commission (ASIC), steps into the ...
Fortinet expands FortiCloud with identity, secure storage, and communication services to power the modern enterprise

Fortinet expands FortiCloud with identity, secure storage, and communication services to power the modern enterprise

New services enhance identity management, secure file storage and recovery, and communication, advancing the Fortinet Security Fabric and global cloud network vision 
Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Bug bounty program incentivises security research to make customers and industry safer 
Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic AI SOC Engine (EASE) reduces alert fatigue and investigation time by integrating context-aware AI with existing SIEM and EDR tools
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This