The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Combating AI-Driven Attacks with Predictive Breach Technology
Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live.
One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...

Small Businesses Can Pull Their SOCs Up
Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy on-premises security solutions have given way to the cloud solutions offering greater scalability for enterprises.

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams
The mythical cybersecurity unicorn – someone that can manage the minutiae of data coming in from logs, understand business risks in detail, communicate them to your board and run your security education and awareness program – does not exist.

Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry
As people put off upgrading their still-functional Android phones, an ever-growing proportion are becoming outdated, and threat actors are cashing in.

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity
Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.

The Future of VPNs? No Where.
Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on ‘Zero Trust’.
Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...

Predicting The Future – With Kavitha Mariappan
What Developments In The Threat Landscape Do Australians Need To Be Aware Of?
In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...

How to Protect Against the Rising Tide of Password Spray Attacks
Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.
No results found.
In The News
Bitdefender Launches Global Campaign to Combat AI-Driven Scams Targeting Families
SYDNEY – 10 October 2025 – Bitdefender, a global leader in cybersecurity protection, today announced the launch of They Wear Our Faces, a global scam awareness campaign designed to educate consumers about the continued growth and sophistication of online scams. Timed with Cybersecurity Awareness Month, the campaign highlights the dangers of deepfake ...
Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A
Panther Lake will enter high-volume production at Intel’s newest fab in Arizona later this year as company invests in strengthening U.S. technology and manufacturing leadership.
CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control
Machine identities outnumber human identities by 82 to 1.
Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges.
CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia
ColorTokens today reaffirmed its commitment to the Australian market including federal, state, and local government agencies, regulated industries, critical infrastructure operators, and enterprises.
Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution
87 per cent of cybersecurity professionals expect artificial intelligence to enhance their roles, offering efficiency and relief amid cyber skill shortages, but they require upskilling to unlock full potential
Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering
Semperis' first-of-its-kind Ready1 for Identity Crisis Management combines market-leading hybrid identity recovery and crisis management to streamline out-of-band communications, reporting, and identity recovery
Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights
Sydney, Australia – 9 October, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all size business, has introduced Barracuda Research, a new centralised resource for threat intelligence, real-world incident analysis, email threat detection data from Barracuda AI, and more. ...
Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition
Sophos today announced it has been named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment (doc #US52997325, September 2025) report.
The IDC MarketScape for Extended Detection and Response cites Sophos’ protection capabilities as a strength, noting, “Sophos is viewed favourably in terms ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
