The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Future of VPNs? No Where.

The Future of VPNs? No Where.

Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on ‘Zero Trust’. Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...
Predicting the Future – With Kavitha Mariappan

Predicting the Future – With Kavitha Mariappan

What Developments in the Threat Landscape Do Australians Need to Be Aware Of? In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...
How to Protect Against the Rising Tide of Password Spray Attacks

How to Protect Against the Rising Tide of Password Spray Attacks

Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.
Australian Energy Sector Grappling With Rising Ransomware Threat

Australian Energy Sector Grappling With Rising Ransomware Threat

As the energy sector continues to embrace technology, cybersecurity needs to be prioritised. This requires investment in secure infrastructure, training programs, and skilled IT personnel.
Eliminating Enterprise Risk: One Phishing-resistant User at a Time

Eliminating Enterprise Risk: One Phishing-resistant User at a Time

Phishing is a major cybersecurity threat for enterprises. Organisations must go beyond just implementing phishing-resistant MFA; they need to develop phishing-resistant users. This involves securing every stage of the user lifecycle, from registration to account recovery, ensuring that all authentication methods are resistant to phishing. As users move ...
How to Innovate in a Privacy-Protective Way

How to Innovate in a Privacy-Protective Way

Adobe executive provides guidance for businesses looking to prioritise responsible data stewardship while navigating the rapidly evolving digital landscape.
Leading Cybersecurity Tech Trends Driving Change

Leading Cybersecurity Tech Trends Driving Change

In an age of digital transformation, cybersecurity emerges as an essential consideration for organisations. Amidst the escalating threat of cybercrime and a string of high-profile attacks, current trends are leading Australian organisations to reassess their approach.
Layers of Defence Needed to Combat AI-powered Phishing Surge

Layers of Defence Needed to Combat AI-powered Phishing Surge

AI-driven phishing attacks are becoming increasingly sophisticated, posing significant risks to industries handling sensitive data, such as financial services, healthcare, and legal sectors. To combat this, organisations must implement layered cybersecurity defences, from robust email filtering to comprehensive user training and rapid incident ...
No results found.

In the News

76 Percent of Organizations Struggle to Match the Speed of AI-Powered Attacks, Finds CrowdStrike State of Ransomware Survey

76 Percent of Organizations Struggle to Match the Speed of AI-Powered Attacks, Finds CrowdStrike State of Ransomware Survey

Ransomware readiness lags as adversaries use AI across the attack chain to accelerate intrusion, encryption, and extortion
Two Tasmanian Local Councils Strengthen Cyber Resilience Through Partnership With Excite Cyber

Two Tasmanian Local Councils Strengthen Cyber Resilience Through Partnership With Excite Cyber

“You can buy technology, but without people, it won’t work. Excite Cyber helped us embed security as part of our culture. That’s something we couldn’t have achieved alone without their training and guidance.”
Iron Mountain Becomes Official Partner of McLaren Racing

Iron Mountain Becomes Official Partner of McLaren Racing

SYDNEY, AU -- Iron Mountain, a global leader in information management services, and McLaren Racing have announced the company as an Official Partner of the McLaren Formula 1 Team.  Iron Mountain will play a key role in McLaren Racing’s digital heritage transformation journey. Its AI-enabled digital platform will help to activate McLaren's legendary ...
New Infoblox Research Links One of Asia’s Largest iGaming Providers to Criminal Underworld

New Infoblox Research Links One of Asia’s Largest iGaming Providers to Criminal Underworld

Infoblox Threat Intel (ITI), together with the United Nations Office on Drugs and Crime (UNODC), has linked BBIN aka Baoying Group, one of Asia’s largest iGaming providers, through interlocking corporate ownership structures and affiliations to cyber-enabled fraud, illegal online gambling, and organised crime in Southeast Asia. At the heart of ITI’s ...
Sophos Announces Latest Evolution of Its Security Operations Portfolio  

Sophos Announces Latest Evolution of Its Security Operations Portfolio  

Sophos recently announced significant enhancements to its Security Operations portfolio, already trusted by over 75,000 organisations worldwide via Sophos XDR and Sophos MDR offerings, marking a major milestone in its integration journey following the acquisition of Secureworks in February 2025. In the months since the acquisition of Secureworks for ...
Darktrace Brings Industry First Endpoint Visibility and Enhanced Agentic AI to ActiveAI Security Platform™, Closing the Gaps in Cyber Defences

Darktrace Brings Industry First Endpoint Visibility and Enhanced Agentic AI to ActiveAI Security Platform™, Closing the Gaps in Cyber Defences

These innovations provide a new level of understanding across an organisation’s digital footprint, enabling security teams to close the seams attackers exploit as they cross IT domain boundaries, stop emerging threats and act with the speed, context, and confidence needed to stay ahead of attackers.
New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

Study Calls for cross-sector collaboration to safely scale AI without slowing innovation
Oracle Database@Google Cloud Is Now Available in Australia

Oracle Database@Google Cloud Is Now Available in Australia

Powerful multicloud database service will help customers in Australia improve analytics and AI productivity, support data hosting residency regulations, and accelerate IT modernisation | Oracle Exadata Database Service on Dedicated Infrastructure will be the first Oracle Database@Google Cloud service supported | Industry-first reseller program enables ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This