The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day

Rome was not Built in a Day. Security is not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
No results found.

In The News

Semperis Announces Midnight In The War Room: A Groundbreaking Cyberwar Documentary Featuring The World’s Leading Defenders And Reformed Hackers

Semperis Announces Midnight In The War Room: A Groundbreaking Cyberwar Documentary Featuring The World’s Leading Defenders And Reformed Hackers

The first-of-its-kind feature film delves into the high-stakes conflict between cyber attackers and defenders, revealing untold stories of CISOs - their heroism, resilience, and the human cost of cyber war.
Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365

Threat Spotlight: Barracuda unpacks a stealthy new phishing kit targeting Microsoft 365

SYDNEY, Australia - 16 October 2025 - An emerging, stealthy and persistent phishing-as-a-service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users, according to new research from Barracuda. Barracuda threat analysts have been tracking the new and rapidly evolving PhaaS since July 2025 and have named it Whisper ...
Trend Micro Named a Leader in Network Analysis and Visibility

Trend Micro Named a Leader in Network Analysis and Visibility

SYDNEY, October 16, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) announced today that it has been named a Leader in Network Analysis and Visibility (NAV) solutions by Forrester. The analyst firm’s independent market evaluation scores the flagship Trend Vision One™ platform highest among all 12 evaluated solutions in the “current offering” ...
Banking scams up 65% globally in last year

Banking scams up 65% globally in last year

SMS text-based phishing (smishing) surges by a factor of 10
ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation

ROCon Houston 2025: Qualys Expands Enterprise TruRisk Management (ETM) with Built-in Agentic AI Fabric to Include Identity Security, Industry-Specific Threat Prioritisation, and Exploit Validation

Enhancements to Qualys ETM platform with integrated remediation help predict and prevent emerging threats to enable provable risk reduction for organisations
Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection

Bitdefender announces global availability of GravityZone PHASR as a standalone solution, defining pre-emptive endpoint security protection

Bitdefender today announced the worldwide availability of GravityZone Proactive Hardening and Attack Surface Reduction (PHASR) as a standalone solution, making its groundbreaking pre-emptive security technology available to all organisations regardless of their existing endpoint protection (EPP) or endpoint detection and response (EDR) platforms they ...
NetApp Transforms Enterprise Cloud with Google Cloud

NetApp Transforms Enterprise Cloud with Google Cloud

Flexible and powerful block storage now available in Google Cloud NetApp Volumes, along with even greater AI integration for enterprise transformation
Verint Earns Top Recognition for AI Vision and Capability in CrayonIQ’s Inaugural APAC Contact Centre CX Platforms with AI Buyers Guide

Verint Earns Top Recognition for AI Vision and Capability in CrayonIQ’s Inaugural APAC Contact Centre CX Platforms with AI Buyers Guide

CX Automation Pioneer Named an “Enterprise Transformer” in Asia Pacific
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This