The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting the Cost Trajectory: Five Ways to Maximise Your Digital Transformation ROI

Disrupting the Cost Trajectory: Five Ways to Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome Was Not Built in a Day. Security Is Not Built in a Day

Rome Was Not Built in a Day. Security Is Not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons in Improving Cyber Defences for Australian Organisations Through People, Processes, and Technology

Lessons in Improving Cyber Defences for Australian Organisations Through People, Processes, and Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why It Takes More Than Phishing Tests to Build a Cyber Aware Culture

Why It Takes More Than Phishing Tests to Build a Cyber Aware Culture

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
Cybersecurity Needs an Image Make-Over to Attract the Diverse Skills Needed to Protect Our Nation

Cybersecurity Needs an Image Make-Over to Attract the Diverse Skills Needed to Protect Our Nation

There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...
No results found.

In the News

76 Percent of Organizations Struggle to Match the Speed of AI-Powered Attacks, Finds CrowdStrike State of Ransomware Survey

76 Percent of Organizations Struggle to Match the Speed of AI-Powered Attacks, Finds CrowdStrike State of Ransomware Survey

Ransomware readiness lags as adversaries use AI across the attack chain to accelerate intrusion, encryption, and extortion
Two Tasmanian Local Councils Strengthen Cyber Resilience Through Partnership With Excite Cyber

Two Tasmanian Local Councils Strengthen Cyber Resilience Through Partnership With Excite Cyber

“You can buy technology, but without people, it won’t work. Excite Cyber helped us embed security as part of our culture. That’s something we couldn’t have achieved alone without their training and guidance.”
Iron Mountain Becomes Official Partner of McLaren Racing

Iron Mountain Becomes Official Partner of McLaren Racing

SYDNEY, AU -- Iron Mountain, a global leader in information management services, and McLaren Racing have announced the company as an Official Partner of the McLaren Formula 1 Team.  Iron Mountain will play a key role in McLaren Racing’s digital heritage transformation journey. Its AI-enabled digital platform will help to activate McLaren's legendary ...
New Infoblox Research Links One of Asia’s Largest iGaming Providers to Criminal Underworld

New Infoblox Research Links One of Asia’s Largest iGaming Providers to Criminal Underworld

Infoblox Threat Intel (ITI), together with the United Nations Office on Drugs and Crime (UNODC), has linked BBIN aka Baoying Group, one of Asia’s largest iGaming providers, through interlocking corporate ownership structures and affiliations to cyber-enabled fraud, illegal online gambling, and organised crime in Southeast Asia. At the heart of ITI’s ...
Sophos Announces Latest Evolution of Its Security Operations Portfolio  

Sophos Announces Latest Evolution of Its Security Operations Portfolio  

Sophos recently announced significant enhancements to its Security Operations portfolio, already trusted by over 75,000 organisations worldwide via Sophos XDR and Sophos MDR offerings, marking a major milestone in its integration journey following the acquisition of Secureworks in February 2025. In the months since the acquisition of Secureworks for ...
Darktrace Brings Industry First Endpoint Visibility and Enhanced Agentic AI to ActiveAI Security Platform™, Closing the Gaps in Cyber Defences

Darktrace Brings Industry First Endpoint Visibility and Enhanced Agentic AI to ActiveAI Security Platform™, Closing the Gaps in Cyber Defences

These innovations provide a new level of understanding across an organisation’s digital footprint, enabling security teams to close the seams attackers exploit as they cross IT domain boundaries, stop emerging threats and act with the speed, context, and confidence needed to stay ahead of attackers.
New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

Study Calls for cross-sector collaboration to safely scale AI without slowing innovation
Oracle Database@Google Cloud Is Now Available in Australia

Oracle Database@Google Cloud Is Now Available in Australia

Powerful multicloud database service will help customers in Australia improve analytics and AI productivity, support data hosting residency regulations, and accelerate IT modernisation | Oracle Exadata Database Service on Dedicated Infrastructure will be the first Oracle Database@Google Cloud service supported | Industry-first reseller program enables ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This