The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
Australian Federal Budget – What’s in the bag?

Australian Federal Budget – What’s in the bag?

On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion. The Government's key priorities in this Budget are addressing the cost of living, ...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...
The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.
How Disjointed Identities have Become a Significant Security Threat

How Disjointed Identities have Become a Significant Security Threat

The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.
No results found.

In The News

Genetec Delivers Faster, Smarter Investigations In Security Center SaaS

Genetec Delivers Faster, Smarter Investigations In Security Center SaaS

New intelligent automation-powered investigation capabilities enable operators to quickly locate video evidence, understand context, and close cases in minutes.
Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of The Year and S5 Technology Group as Workspace Security Partner of The Year

Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of The Year and S5 Technology Group as Workspace Security Partner of The Year

Sydney, 22 September 2025 - Check Point® Software Technologies Ltd., a pioneer and global leader of cyber security solutions, has announced its top-performing partners across the Asia Pacific region at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held earlier this month in Hanoi, Vietnam. The annual conference brought ...
Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Phishing-resistant MFA, enhanced privileged access, and identity-driven case management strengthen unified initial access, privilege control, and SOC response across human and agent identities
CrowdStrike Delivers Unified Data Protection for the AI Era

CrowdStrike Delivers Unified Data Protection for the AI Era

Falcon Data Protection expands GenAI data protection to local apps and runtime cloud environments; unveils new innovations to replace legacy data loss and posture management tools with real-time, unified protection across endpoint, cloud, SaaS, and GenAI
Palo Alto Networks Recognises Leading Asia-Pacific and Japan Partners at 2025 Partner Executive Kick-Off

Palo Alto Networks Recognises Leading Asia-Pacific and Japan Partners at 2025 Partner Executive Kick-Off

Palo Alto Networks® (NASDAQ: PANW), the global cybersecurity leader, today announced the winners of its 2025 Asia-Pacific and Japan Partner Awards at the Palo Alto Networks Partner Executive Kick-Off (PEKO). The annual awards recognise and celebrate the top partners of the year, those who have showcased outstanding contributions and unwavering ...
New Report Finds 49% of Security Professionals Say Global Economic Policies and Geopolitical Tensions Increase Risk to Cyber-physical Environments

New Report Finds 49% of Security Professionals Say Global Economic Policies and Geopolitical Tensions Increase Risk to Cyber-physical Environments

Global survey by Claroty uncovers how organisations are navigating an uncertain economic landscape to secure mission-critical infrastructure
Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis today announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical Identity infrastructure, including Microsoft Active Directory assets, from cyberattacks.
ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

New Capabilities in Log360 Tackle False Positives, Keep Threat Coverage Current, and Enable Scaling With Enterprise Demand
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This