The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity
Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.

The Future of VPNs? No Where.
Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on ‘Zero Trust’.
Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...

Predicting The Future – With Kavitha Mariappan
What Developments In The Threat Landscape Do Australians Need To Be Aware Of?
In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...

How to Protect Against the Rising Tide of Password Spray Attacks
Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.

Australian Energy Sector Grappling with Rising Ransomware Threat
As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.

Eliminating Enterprise Risk: One Phishing-resistant User At a Time
Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...

How to Innovate in a Privacy-Protective Way
Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.

Leading Cybersecurity Tech Trends Driving change
In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.
No results found.
In The News
Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild
Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years.
“While patches are available for ...
Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia
82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025
Sydney, Australia – 27 August 2025 – Axis Communications Oceania returns as headline sponsor of Security & Integrate 2025, showcasing intelligent technologies that transform insight into action.
In a world of complex security challenges, Axis is redefining safety, security, business intelligence, and operational efficiency with cutting-edge ...
Phishing Gangs Use Split and Nested QR Codes to Evade Detection In New Wave of ‘Quishing’ Attacks
Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks.

Global CloudCon Summit Lands in Sydney
Technology summit, CloudCon, is returning to Sydney for an immersive two-day experience with some of the world’s leading cloud and Kubernetes experts at the International Convention Centre on 9 and 10 September 2025.
Trend Micro Named A Leader in Exposure Management by IDC MarketScape
Measurable reduction of operational silos and cyber risk delivered with Trend Vision One™ Cyber Risk Exposure Management
Introducing SailPoint Accelerated Application Management: A Breakthrough Approach to Manage and Govern Applications At Scale With Intelligence
An industry-first solution that combines application intelligence with systematic governance, enabling organisations to scale from dozens to hundreds of governed applications
Kinetic IT Named Pre-approved Supplier On WA Government’s IT Procurement Panel (CUATIS2024)
August 26, 2025 - Kinetic IT has been appointed as a pre-approved supplier to the Western Australian Government’s CUATIS2024 Technology Infrastructure and Solutions panel, giving agencies a prequalified route to market that reduces procurement complexity and accelerates delivery.
CUATIS2024 is the State Government’s new whole-of-government buying ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
