The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Conversations Boards Should Have About Cybersecurity
Phishing attacks, malware, social engineering, spear phishing, and credential stuffing are all cyber threats that have one alarming trait in common. They are now more rampant than ever, leaving Australian organisations at the mercy of their relentless and sophisticated tactics. This is why board members need to be more than just decision-makers; they ...

Advancing Security and Resilience: Insights from AWS Summit in Sydney
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key conversations included addressing AI bias, security implications of AI policies, and AWS's commitment to meeting rigorous security standards.
Artificial Intelligence in Academia
AI - An Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of this technology may replace some jobs, it offers new and emerging careers with Australia needing up to 161,000 additional specialist AI workers in the next 15 ...
The Glimpse at the Future of Software Academia
Software is key to a computers’ functionality and in fact, a system can’t operate without it. As we continually become more reliant on computers, the demand for software and application developers will increase - by 27 per cent from 2021 to 2026.1
From the late 1940s through the 1970s, the concept of software development has its’ origins in ...

‘Captivity Clouds’ – A Trap For Modern Day Security Leaders
Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when attempting to integrate or transition to other solutions and providers across the broader cloud ecosystem. Captivity clouds have left organisations within the confines of heavily ...

Prioritise Foundational Cloud Security Before Leveraging Generative AI
An article around how to prioritise foundational cloud security before leveraging Generative AI.

How Data Quality Is Limiting Your Organisation’s AI Success
Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more than that. We’re now living in a world where holding onto too much data could get you ...

Cybersecurity Budgets and Readiness – Are we there yet?
In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver ...
No results found.
In The News
Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability
Company positioned closest to the centre of the Radar, underscoring its ability to help customers understand their dynamic cloud environments beyond the capacity of competitive solutions
Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board
ISACA, the global professional association supporting digital trust professionals, has announced the appointment of Australian cybersecurity expert Jamie Norton as Vice Chair of its 2025–2026 Board of Directors.
Norton, currently Chief Information Security Officer (CISO) for the Australian Securities and Investments Commission (ASIC), steps into the ...
Fortinet expands FortiCloud with identity, secure storage, and communication services to power the modern enterprise
New services enhance identity management, secure file storage and recovery, and communication, advancing the Fortinet Security Fabric and global cloud network vision
Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership
Bug bounty program incentivises security research to make customers and industry safer
Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats
Elastic AI SOC Engine (EASE) reduces alert fatigue and investigation time by integrating context-aware AI with existing SIEM and EDR tools
43% of Australian Ransomware Victims Threatened with Physical Harm – New Semperis Report
Study shows many companies paid multiple ransoms in the past 12 months. Victims also report that hackers have threatened to physically harm executives and file regulatory complaints against their companies.
Pax8 Names Lindsay Zwart as EVP and General Manager of the Asia-Pacific Region at Pax8
BRISBANE, AUSTRALIA (August 8, 2025) – Pax8, the leading cloud commerce Marketplace, today announced the appointment of Lindsay Zwart as Executive Vice President and General Manager of the Pax8 Asia-Pacific (APAC) region. In this role, Zwart will spearhead all aspects of the APAC business for Pax8, driving the company’s ambitious growth strategy by ...
ManageEngine to ‘Bowl Over’ Cyber Threats at Iconic Australian Cricket Grounds
Company announces events that explore the intersection of identity security, Zero Trust, and real-time threat defence in a unique Australian setting
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
