The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
Australian Federal Budget – What’s in the bag?

Australian Federal Budget – What’s in the bag?

On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion. The Government's key priorities in this Budget are addressing the cost of living, ...
Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

Understanding the Growing Cybersecurity Threats and Challenges with Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...
The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

The Three Ways Australian Infrastructure Operators are Converging Physical and IT Security Functions

Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.
How Disjointed Identities have Become a Significant Security Threat

How Disjointed Identities have Become a Significant Security Threat

The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.
No results found.

In The News

New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

“To stay ahead of the curve, businesses across Australia and New Zealand need to prioritise reducing tool sprawl and data siloes so engineers can detect and resolve critical issues fast. With high-business impact outages costing up to $3 million per hour in lost revenue, organisations can no longer ignore the costs associated with maintaining the status quo.”
Arctic Wolf Enhances Threat Intelligence Plus to Strengthen Proactive Defense

Arctic Wolf Enhances Threat Intelligence Plus to Strengthen Proactive Defense

Sydney, Australia – Arctic Wolf®, a global leader in security operations, today announced enhancements to Arctic Wolf Threat Intelligence Plus, introducing a new capability that allows organisations to deploy a threat feed with the same high-fidelity indicators of compromise (IoCs) used by Arctic Wolf’s AI-powered Security Operations Center (SOC) ...
CyberArk Names Omer Grossman Chief Trust Officer and Head of CYBR Unit; Appoints Ariel Pisetzky as CIO

CyberArk Names Omer Grossman Chief Trust Officer and Head of CYBR Unit; Appoints Ariel Pisetzky as CIO

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced two executive appointments to strengthen its leadership team and support the company's growth and innovation strategy. Omer Grossman, who has served as CyberArk's Chief Information Officer since late 2022, has been appointed to the newly created role of Chief Trust ...
Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

AI-powered Risk-based Patching enables customers to identify, prioritize, and fix the vulnerabilities that matter most through a single unified platform
CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

System of autonomous agents reason, hunt, and take decisive action across the kill chain, supercharging analyst investigations and threat response
Ping Identity Shapes the Future of Enterprise Security With AI-Driven Trust Framework

Ping Identity Shapes the Future of Enterprise Security With AI-Driven Trust Framework

Safeguards Autonomous Agents While Keeping Humans in Control 
DroneShield Surpasses 4,000 Systems Sold, $7.9m orders

DroneShield Surpasses 4,000 Systems Sold, $7.9m orders

ASX-listed DroneShield has announced it has surpassed 4,000 systems sold worldwide with the receipt of a package of two standalone contracts totalling A$7.9 million for handheld systems for delivery to the U.S. Department of Defense. DroneShield expects to deliver all equipment in Q4 2025, with cash payment expected in Q4 2025. No additional material ...
New Research Uncovers Large-Scale Malicious Ad Network, Illuminating Connection Between AdTech Platforms and Malicious Actors

New Research Uncovers Large-Scale Malicious Ad Network, Illuminating Connection Between AdTech Platforms and Malicious Actors

Sydney, Australia; September 17, 2025 - Infoblox Threat Intel has released groundbreaking reporting on “Vane Viper,” a threat actor masquerading as a legitimate adtech enterprise. This group is responsible for facilitating a variety of scams and malware distribution through their affiliate advertising programs but also are directly involved in malware ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This