The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams
The mythical cybersecurity unicorn – someone that can manage the minutiae of data coming in from logs, understand business risks in detail, communicate them to your board and run your security education and awareness program – does not exist.

Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry
As people put off upgrading their still-functional Android phones, an ever-growing proportion are becoming outdated, and threat actors are cashing in.

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity
Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.

The Future of VPNs? No Where.
Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on ‘Zero Trust’.
Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...

Predicting The Future – With Kavitha Mariappan
What Developments In The Threat Landscape Do Australians Need To Be Aware Of?
In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...

How to Protect Against the Rising Tide of Password Spray Attacks
Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.

Australian Energy Sector Grappling with Rising Ransomware Threat
As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.

Eliminating Enterprise Risk: One Phishing-resistant User At a Time
Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
No results found.
In The News
KnowBe4 Releases Cybersecurity Awareness Month Resource Kit at No Cost
KnowBe4 launches its seventh resource kit for cybersecurity awareness month to empower individuals & organisations to "Secure Our World" with practical tools and training
CrowdStrike Agrees to Acquire Onum to Supercharge Falcon Next-Gen SIEM
Real-time data pipeline platform eliminates migration barriers and delivers autonomous in-pipeline threat detection
Capture The Bug Achieves CREST Penetration Testing Accreditation in Australasia
Capture The Bug, a leading Penetration Testing as a Service (PTaaS) platform, is proud to announce its official CREST Penetration Testing accreditation in Australasia. This significant milestone demonstrates our commitment to delivering the highest standards of cybersecurity testing across Australia and New Zealand, placing Capture The Bug among an ...
New Sophos Report Finds AI Adoption and Increased Threat Activity Amongst Drivers Keeping Cybersecurity Burnout High In Australia in 2025
Shadow AI, resource and budget shortages and meeting compliance and regulatory requirements put pressure on security teams
Claroty Achieves AWS Manufacturing and Industrial Competency for OT Security
Claroty achieves AWS Manufacturing and Industrial Competency for OT Security. Achievement highlights company’s ability to provide unrivalled OT expertise for securing mission-critical infrastructure.
Turnitin Enhances Capabilities Amid Growing AI Bypasser Use
New detection feature helps educators detect potential AI misuse
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall
Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats
CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity
Replaces legacy SSO with CyberArk to enable secure, frictionless workforce access
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
