The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
Australian Federal Budget – What’s in the bag?

Australian Federal Budget – What’s in the bag?

On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion. The Government's key priorities in this Budget are addressing the cost of living, ...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...
The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.
How Disjointed Identities have Become a Significant Security Threat

How Disjointed Identities have Become a Significant Security Threat

The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.
No results found.

In The News

Tenable Patch Tuesday Commentary

Tenable Patch Tuesday Commentary

This month’s Patch Tuesday release highlights an emerging trend. For the third time this year, Microsoft patched more elevation of privilege vulnerabilities than remote code execution flaws. Nearly 50% (47.5%) of all bugs this month are privilege escalation vulnerabilities. One of the more interesting vulnerabilities patched this month is ...
Cisco and Splunk elevate the SOC with Agentic AI

Cisco and Splunk elevate the SOC with Agentic AI

Cisco today introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR). Delivered within Splunk Enterprise Security 8.2 – a market-leading SIEM solution – these ...
Databricks Surpasses $4B Revenue Run-Rate, Exceeding $1B AI Revenue Run-Rate

Databricks Surpasses $4B Revenue Run-Rate, Exceeding $1B AI Revenue Run-Rate

SYDNEY, Australia — September 9, 2025 — Databricks, the Data and AI company, today announced it has crossed a $4 billion revenue run-rate during Q2, growing >50% year over year. Databricks’ AI products also recently crossed a $1 billion revenue run-rate. The company has also achieved positive free cash flow over the last 12 months. Finally, the ...
Singapore Tops Global AI Security Readiness, Yet Fears Shadow AI the Most

Singapore Tops Global AI Security Readiness, Yet Fears Shadow AI the Most

New Delinea research finds 62% of Singaporean firms grapple with Shadow AI at least monthly - fueling the highest global level of concern among business leaders 
The Machine Identity Gap: Only 28% of Australian Firms Ready for Secure AI

The Machine Identity Gap: Only 28% of Australian Firms Ready for Secure AI

Delinea research finds Australia ranks lowest in AI security readiness. Businesses are also worried about the high level of shadow AI.  
Quorum Cyber Reveals New Cybercriminal Tactics in Mid-Year Global Cyber Risk Outlook Report

Quorum Cyber Reveals New Cybercriminal Tactics in Mid-Year Global Cyber Risk Outlook Report

“What we’ve seen in H1 2025 is both striking and sobering. The sheer volume of new entrants, more than 70 new threat groups and MaaS offerings, highlights the unyielding pace of cybercriminal innovation,” says Paul Caiazzo, Quorum Cyber’s Chief Threat Officer. “As we move into the latter half of 2025, we anticipate further innovation in social ...
Nasdaq Verafin and BioCatch Form Strategic Partnership to Accelerate the Global Fight Against Financial Crime

Nasdaq Verafin and BioCatch Form Strategic Partnership to Accelerate the Global Fight Against Financial Crime

Partnership combines industry-leading consortium data and behavioral intelligence to bolster financial institutions’ defense against fraud
Check Point Expands Harmony SASE with Enterprise Browser, Delivering Zero Trust to Any Device

Check Point Expands Harmony SASE with Enterprise Browser, Delivering Zero Trust to Any Device

Enterprise Browser secures access on unmanaged devices without compromising compliance or productivity
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This