The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Layers of Defence Needed to Combat AI-powered Phishing Surge
AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...

Essential Approaches for Securing the Multi-cloud
From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach
The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach
Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...

Australian Federal Budget – What’s in the bag?
On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion.
The Government's key priorities in this Budget are addressing the cost of living, ...

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...

The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions
Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.

How Disjointed Identities have Become a Significant Security Threat
The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.
No results found.
In The News
Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create
Phishing-resistant MFA, enhanced privileged access, and identity-driven case management strengthen unified initial access, privilege control, and SOC response across human and agent identities
CrowdStrike Delivers Unified Data Protection for the AI Era
Falcon Data Protection expands GenAI data protection to local apps and runtime cloud environments; unveils new innovations to replace legacy data loss and posture management tools with real-time, unified protection across endpoint, cloud, SaaS, and GenAI
Palo Alto Networks Recognises Leading Asia-Pacific and Japan Partners at 2025 Partner Executive Kick-Off
Palo Alto Networks® (NASDAQ: PANW), the global cybersecurity leader, today announced the winners of its 2025 Asia-Pacific and Japan Partner Awards at the Palo Alto Networks Partner Executive Kick-Off (PEKO). The annual awards recognise and celebrate the top partners of the year, those who have showcased outstanding contributions and unwavering ...
New Report Finds 49% of Security Professionals Say Global Economic Policies and Geopolitical Tensions Increase Risk to Cyber-physical Environments
Global survey by Claroty uncovers how organisations are navigating an uncertain economic landscape to secure mission-critical infrastructure
Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience
Cohesity and Semperis today announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical Identity infrastructure, including Microsoft Active Directory assets, from cyberattacks.
ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams
New Capabilities in Log360 Tackle False Positives, Keep Threat Coverage Current, and Enable Scaling With Enterprise Demand
Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships
Cohesity today announced multiple cyber resilience breakthroughs at the company’s Catalyst 1 Data Security Summit, extending its pioneering Five-Step Cyber Resilience Framework to companies and governments. These innovations include unmatched protection for compute, container, storage, and database workloads across the three leading hyperscale clouds, ...
New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages
“To stay ahead of the curve, businesses across Australia and New Zealand need to prioritise reducing tool sprawl and data siloes so engineers can detect and resolve critical issues fast. With high-business impact outages costing up to $3 million per hour in lost revenue, organisations can no longer ignore the costs associated with maintaining the status quo.”
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
