The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting the Cost Trajectory: Five Ways to Maximise Your Digital Transformation ROI

Disrupting the Cost Trajectory: Five Ways to Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome Was Not Built in a Day. Security Is Not Built in a Day

Rome Was Not Built in a Day. Security Is Not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons in Improving Cyber Defences for Australian Organisations Through People, Processes, and Technology

Lessons in Improving Cyber Defences for Australian Organisations Through People, Processes, and Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
Why IT Takes More Than Phishing Tests to Build a Cyber Aware Culture

Why IT Takes More Than Phishing Tests to Build a Cyber Aware Culture

A strong cybersecurity posture is as much about culture as it is about technology. In the 2022-23 financial year, 78 per cent of Australian businesses offered annual cybersecurity training to their entire workforce; however, only 39 per cent of these businesses provided specialised training for privileged users who are authorised to perform ...
Cybersecurity Needs an Image Make-Over to Attract the Diverse Skills Needed to Protect Our Nation

Cybersecurity Needs an Image Make-Over to Attract the Diverse Skills Needed to Protect Our Nation

There is no single silver bullet that can solve this problem. Tackling the cybersecurity shortage requires a multi-faceted approach that attracts new workers to the industry. These efforts must provide multiple entry points to attract workers to minimise the impact of the current, acute need and create pathways to make cybersecurity attractive, so ...
Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Is a Vendor SOC-as-a-Service Offering Something That Should Be Seriously Considered?

Introduction In today’s increasingly complex cybersecurity landscape, organisations face an ever-growing number of threats. Cybercriminals are becoming more sophisticated, and the costs associated with a breach can be catastrophic. To combat these challenges, many organisations are turning to Security Operations Centre (SOC) as a Service, an ...
No results found.

In the News

BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch, which prevents financial crime by recognising patterns in human behaviour, today announced a major upgrade to its market-leading digital fraud- and financial crime-detection platform. BioCatch Connect 2.0 features both BioCatch Align, a singular, next-generation software development kit (SDK) that unifies signal collection (behaviour, device, ...
Check Point Software Collaborates With Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

Check Point Software Collaborates With Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

As AI reshapes enterprise workflows, Check Point works with Microsoft to enable secure agent innovation powered by real-time guardrails, DLP, and threat prevention REDWOOD CITY, CA. November 18, 2025 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is collaborating ...
Rapid7 Delivers Smarter Network Security With Curated Intelligence Rules for AWS Network Firewall

Rapid7 Delivers Smarter Network Security With Curated Intelligence Rules for AWS Network Firewall

Rapid7's Curated Intelligence Rules for AWS Network Firewall delivers threat intelligence directly into customers’ AWS environments to address the operational challenges security teams face when manually managing and updating firewall rules to keep pace with evolving threats.
Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

New services address emerging risks as organisations expand agentic AI across mission-critical environments     SYDNEY, November 20, 2025 – Kyndryl (NYSE: KD), a leading provider of mission-critical enterprise technology services, today announced Kyndryl Agentic AI Digital Trust to help enterprises securely manage and scale their agentic AI ...
CyberArk Unveils Free Tool and Powerful TLS Certificate Scan to Help Organisations Tackle Soaring Labor Costs and Disruptive System Outages

CyberArk Unveils Free Tool and Powerful TLS Certificate Scan to Help Organisations Tackle Soaring Labor Costs and Disruptive System Outages

Certificate lifespans are shrinking from 398 days today to just 47 days by 2029 | Transitioning to automated renewals will dramatically decrease labor costs | CyberArk’s new tools help organisations understand exposure and calculate renewal impact in seconds
Sophos Recognised With Microsoft Verified Small and Medium Business Solution Status

Sophos Recognised With Microsoft Verified Small and Medium Business Solution Status

Sophos has announced its integration with Microsoft Defender for Business, Microsoft Defender for Endpoint, and that its Sophos MDR for Microsoft environments solution has achieved Microsoft verified Small & Medium Business (SMB) solution status through the Microsoft Intelligent Security Association (MISA). Microsoft’s verified SMBSolution status ...
Infoblox Launches Predictive DNS-Based Threat Protection Solution on AWS

Infoblox Launches Predictive DNS-Based Threat Protection Solution on AWS

Infoblox, the leader in uniting networking, security and cloud with a protective DDI platform, today announced the launch of Infoblox AWS Marketplace managed rules for AWS Network Firewall. This new integration strengthens organisations’ cloud security posture with predictive, DNS-based threat intelligence natively within their existing Amazon Web ...
Veeam Data Platform V13 Launches and Redefines the Standard for Cyber Resilience, Advanced Data Protection, Security and Identity Controls, and AI-Powered Intelligence

Veeam Data Platform V13 Launches and Redefines the Standard for Cyber Resilience, Advanced Data Protection, Security and Identity Controls, and AI-Powered Intelligence

Along with new capabilities to outsmart threats and accelerate recovery with next-gen security, forensic insights, and intelligent automation, Veeam is launching the Universal Hypervisor Integration API, a flexible integration platform for hypervisors
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This