The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome Was Not Built in a Day. Security Is Not Built in a Day

Rome Was Not Built in a Day. Security Is Not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons in Improving Cyber Defences for Australian Organisations Through People, Processes, and Technology

Lessons in Improving Cyber Defences for Australian Organisations Through People, Processes, and Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why IT Takes More Than Phishing Tests to Build a Cyber Aware Culture

Why IT Takes More Than Phishing Tests to Build a Cyber Aware Culture

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
Cybersecurity Needs an Image Make-Over to Attract the Diverse Skills Needed to Protect Our Nation

Cybersecurity Needs an Image Make-Over to Attract the Diverse Skills Needed to Protect Our Nation

There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...
Breaking Down Barriers to Cybersecurity Frameworks

Breaking Down Barriers to Cybersecurity Frameworks

Today, cybersecurity frameworks play a crucial role in guiding organisations towards robust defence strategies. However, many organisations face significant challenges in adopting and implementing these frameworks, such as Zero Trust or the Australian Government’s Essential Eight, effectively.   The complexity of deployment, the need for a cultural ...
Security Is Not a Zero-Sum Game

Security Is Not a Zero-Sum Game

The future of cybersecurity is a big and broad topic - specifically our reliance on cloud-based software. Things go wrong and when they do - our whole world turns with it. Jeetu Patel, Executive Vice President & Chief Product Officer at Cisco, discussed his strong stance against monopolies in the tech industry and his view on collaboration and ...
No results found.

In the News

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition
ASUG Tech Connect 2025 Taps SecurityBridge to Discuss SAP Cybersecurity Strategies

ASUG Tech Connect 2025 Taps SecurityBridge to Discuss SAP Cybersecurity Strategies

The SecurityBridge presentation aligns with the technical education focus by detailing the use of context- and risk-based multi-factor authentication (MFA) and step-up authentication via TrustBroker, along with security monitoring, vulnerability management, and incident response practices. In addition, the speakers will also discuss integrating ...
CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

New mission-ready agents work in concert with custom-built and third-party agents to automate high-impact workflows across the full security lifecycle
SecurityBridge Announces “Secure Together New York 2025” a Complimentary SAP Security Event at Accenture’s Manhattan Office

SecurityBridge Announces “Secure Together New York 2025” a Complimentary SAP Security Event at Accenture’s Manhattan Office

The company will join forces with partners Accenture, Bowbridge, Fortinet, NextLabs, and Saviynt to deliver a full day of expert sessions exploring the future of SAP security. These sessions will cover AI-powered segregation of duties (SoD) controls, quantum-resistant strategies, and defense mechanisms against modern ransomware and file-based exploits.
CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

The orchestration layer of the Agentic Security Platform unites intelligent agents to coordinate real-time agent-to-agent and analyst-to-agent collaboration 
CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

New Falcon for XIoT innovations bring deeper industrial and OT telemetry into the Falcon platform, eliminating blind spots and complexity across environments
Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

• Cisco IQ brings real-time insights, on-demand assessments, troubleshooting and personalized learning, automation and agents from across professional services and support together in a single AI-powered interface, helping customers plan, deploy, manage, secure and optimize technology investments with greater speed and simplicity. • With Cisco IQ's ...
CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents With Privilege Controls

CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents With Privilege Controls

Delivers privilege controls, visibility and compliance for the new class of AI agent identities. | Extends CyberArk’s identity security capabilities to secure AI-driven automation at enterprise scale.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This