The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to Protect Against the Rising Tide of Password Spray Attacks

How to Protect Against the Rising Tide of Password Spray Attacks

Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.
Australian Energy Sector Grappling With Rising Ransomware Threat

Australian Energy Sector Grappling With Rising Ransomware Threat

As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.
Eliminating Enterprise Risk: One Phishing-resistant User at a Time

Eliminating Enterprise Risk: One Phishing-resistant User at a Time

Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
How to Innovate in a Privacy-Protective Way

How to Innovate in a Privacy-Protective Way

Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.
Leading Cybersecurity Tech Trends Driving Change

Leading Cybersecurity Tech Trends Driving Change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.
Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
Essential Approaches for Securing the Multi-cloud

Essential Approaches for Securing the Multi-cloud

From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...
Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
No results found.

In the News

Datadog Announces Expanded Offerings for Oracle Cloud Infrastructure

Datadog Announces Expanded Offerings for Oracle Cloud Infrastructure

New integrations for Cloud Cost Management, GPU Monitoring and Cloud SIEM help teams gain full-stack visibility and security across their OCI environments, including AI and machine learning applications
Gen Z Staff Lead Workplace AI Adoption Despite Job Fears – Microsoft Australia Study

Gen Z Staff Lead Workplace AI Adoption Despite Job Fears – Microsoft Australia Study

Gen Z workers are enthusiastically embracing AI at work – and doing so with cautious optimism – according to a new Microsoft Australia study.
DroneShield Releases RfPatrol-Plugin for the TAK Ecosystem

DroneShield Releases RfPatrol-Plugin for the TAK Ecosystem

DroneShield today announced the release of its RfPatrol-Plugin for the Team Awareness Kit (TAK) ecosystem, now available for RfPatrol Mk2 users via the DroneShield Access Portal. The plugin integrates DroneShield’s counter-drone intelligence directly into the civilian TAK command-and-control (C2) environment, supplementing existing data streams, gRPC ...
BlackBerry SecuSUITE Expands to Windows Devices, Extending Sovereign-Grade Protection Across the Digital Workplace

BlackBerry SecuSUITE Expands to Windows Devices, Extending Sovereign-Grade Protection Across the Digital Workplace

WATERLOO, ONTARIO – October 9 – BlackBerry Limited (NYSE: BB; TSX: BB) today announced the expansion of BlackBerry® SecuSUITE® to Windows® devices, extending sovereign-grade secure communications trusted by governments and critical enterprises to include laptops and workstations. This expansion will enable secure voice, messaging, and file sharing ...
Inside Akira’s SonicWall Campaign: Darktrace’s Detection and Response

Inside Akira’s SonicWall Campaign: Darktrace’s Detection and Response

Between July and August 2025, security teams worldwide observed a surge in Akira ransomware incidents involving SonicWall SSL VPN devices. Initially believed to be the result of an unknown zero-day vulnerability, SonicWall later released an advisory announcing that the activity was strongly linked to a previously disclosed vulnerability, ...
Bitdefender Launches Global Campaign to Combat AI-Driven Scams Targeting Families

Bitdefender Launches Global Campaign to Combat AI-Driven Scams Targeting Families

SYDNEY – 10 October 2025 – Bitdefender, a global leader in cybersecurity protection, today announced the launch of They Wear Our Faces, a global scam awareness campaign designed to educate consumers about the continued growth and sophistication of online scams. Timed with Cybersecurity Awareness Month, the campaign highlights the dangers of deepfake ...
Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18a

Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18a

Panther Lake will enter high-volume production at Intel’s newest fab in Arizona later this year as company invests in strengthening U.S. technology and manufacturing leadership.
CyberArk Expands Machine Identity Security Portfolio With Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

CyberArk Expands Machine Identity Security Portfolio With Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

Machine identities outnumber human identities by 82 to 1. Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges. CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This