The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australian Federal Budget – What’s in the bag?
On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion.
The Government's key priorities in this Budget are addressing the cost of living, ...

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...

The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions
Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.

How Disjointed Identities have Become a Significant Security Threat
The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.

How the Security of Critical Infrastructure (SOCI) Act is strengthening Australia’s critical infrastructure cybersecurity posture
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity.

Don’t Be The Weakest Link In The Ongoing Battle Against Phishing Attacks
The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses reported for the year were $2.74 billion, a 13% decrease from 2022, the report ...

Exploring the Intersection of AI and Cybersecurity Ethics
The Recap
In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in the cybersecurity domain, providing valuable insights for both professionals and ...

The Importance of Undertaking Cyber Risk Quantification
This article looks at the process of cyber risk quantification.
No results found.
In The News
43% of Australian Ransomware Victims Threatened with Physical Harm – New Semperis Report
Study shows many companies paid multiple ransoms in the past 12 months. Victims also report that hackers have threatened to physically harm executives and file regulatory complaints against their companies.
Pax8 Names Lindsay Zwart as EVP and General Manager of the Asia-Pacific Region at Pax8
BRISBANE, AUSTRALIA (August 8, 2025) – Pax8, the leading cloud commerce Marketplace, today announced the appointment of Lindsay Zwart as Executive Vice President and General Manager of the Pax8 Asia-Pacific (APAC) region. In this role, Zwart will spearhead all aspects of the APAC business for Pax8, driving the company’s ambitious growth strategy by ...
ManageEngine to ‘Bowl Over’ Cyber Threats at Iconic Australian Cricket Grounds
Company announces events that explore the intersection of identity security, Zero Trust, and real-time threat defence in a unique Australian setting
Oracle Helps Customers Achieve Extreme Availability and Performance for Mission-Critical and Agentic AI Applications
With Oracle Globally Distributed Exadata Database on Exascale Infrastructure, customers can run distributed workloads of all types, including agentic AI, analytics, and transactional while lowering costs.
Transparent access to data and the industry’s broadest set of data distribution policies help customers address data sovereignty and performance ...
Fortinet Reports Second Quarter 2025 Financial Results
Highlights
Revenue grew 14 per cent year over year to US$1.63 billion
Billings grew 15 per cent year over year to US$1.78 billion (1)
Unified secure access service edge (SASE) annual recurring revenue (ARR) up 22 per cent and Security Operations ARR up 35 per cent, year over year (2)
GAAP operating margin of 28 per cent
Non-GAAP operating ...
Ransomware Attacks Surge in Australia: One in Three Hit Multiple Times – New Report
One in Three Australian Ransomware Victims Hit Multiple Times as Security Gaps Persist.
New International Research Shows Ransomware Thrives in Complex and Fragmented IT Security Environments.
F5 and Equinix Expand Partnership to Accelerate AI-Ready Infrastructure for Secure Global Application Delivery
New joint capabilities help enterprises deploy and secure distributed AI workloads and modern apps—without physical infrastructure overhead
Tenable Expands Exposure Management Platform to Secure Enterprise AI
Tenable AI Exposure gives organisations unprecedented visibility into and control over the use of widely adopted generative AI tools like ChatGPT Enterprise and Microsoft Copilot
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
