The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Exploring Opportunities, Fears, and the Future with AI
Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...

Why Robust Disaster Recovery Is a USP for MSPs
As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...

Why CISOs Need a Voice In the Boardroom
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done.
However, this is just part (the start) of the journey to cyber maturity. ...

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction
Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.

Three Force Multipliers To Boost Cybersecurity Protections For Governments
Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as ‘force multipliers’ for improving their protective coverage against cybersecurity threats.

Combating AI-Driven Attacks with Predictive Breach Technology
Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live.
One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...

Small Businesses Can Pull Their SOCs Up
Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy on-premises security solutions have given way to the cloud solutions offering greater scalability for enterprises.

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams
The mythical cybersecurity unicorn – someone that can manage the minutiae of data coming in from logs, understand business risks in detail, communicate them to your board and run your security education and awareness program – does not exist.
No results found.
In The News
Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia
82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025
Sydney, Australia – 27 August 2025 – Axis Communications Oceania returns as headline sponsor of Security & Integrate 2025, showcasing intelligent technologies that transform insight into action.
In a world of complex security challenges, Axis is redefining safety, security, business intelligence, and operational efficiency with cutting-edge ...
Phishing Gangs Use Split and Nested QR Codes to Evade Detection In New Wave of ‘Quishing’ Attacks
Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks.

Global CloudCon Summit Lands in Sydney
Technology summit, CloudCon, is returning to Sydney for an immersive two-day experience with some of the world’s leading cloud and Kubernetes experts at the International Convention Centre on 9 and 10 September 2025.
Trend Micro Named A Leader in Exposure Management by IDC MarketScape
Measurable reduction of operational silos and cyber risk delivered with Trend Vision One™ Cyber Risk Exposure Management
Introducing SailPoint Accelerated Application Management: A Breakthrough Approach to Manage and Govern Applications At Scale With Intelligence
An industry-first solution that combines application intelligence with systematic governance, enabling organisations to scale from dozens to hundreds of governed applications
Kinetic IT Named Pre-approved Supplier On WA Government’s IT Procurement Panel (CUATIS2024)
August 26, 2025 - Kinetic IT has been appointed as a pre-approved supplier to the Western Australian Government’s CUATIS2024 Technology Infrastructure and Solutions panel, giving agencies a prequalified route to market that reduces procurement complexity and accelerates delivery.
CUATIS2024 is the State Government’s new whole-of-government buying ...
NinjaOne Appoints Paul Redding as Head of MSP Partnerships
NinjaOne has announced the appointment of Paul Redding to Head of MSP Partnerships. Redding will lead NinjaOne’s work with MSPs to accelerate growth and success for the company’s partners and customers. In this role, he will enable MSPs to scale their revenue, improve operational efficiency, and deliver increased value to their clients with automated ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
