The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Essential Approaches for Securing the Multi-cloud
From pandemic impacts to the shift to hybrid working, geopolitical and economic pressures continue to disrupt global markets and as a result create significant challenges to sustaining business operating models. For the modern organisation that aims to have built in resiliency to better ride the waves of change in an effective, yet cost-conscious way, ...

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach
The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach
Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...

Australian Federal Budget – What’s in the Bag?
On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion.
The Government's key priorities in this Budget are addressing the cost of living, ...

Understanding the Growing Cybersecurity Threats and Challenges With Mark Anderson
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...

The Three Ways Australian Infrastructure Operators Are Converging Physical and IT Security Functions
Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.

How Disjointed Identities Have Become a Significant Security Threat
The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.

How the Security of Critical Infrastructure (SOCI) Act Is Strengthening Australia’s Critical Infrastructure Cybersecurity Posture
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity.
No results found.
In the News
Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion
Salt Typhoon, a China-linked cyber espionage group, has been observed targeting global infrastructure using stealthy techniques such as DLL sideloading and zero-day exploits. Darktrace recently identified early-stage intrusion activity consistent with Salt Typhoon’s tactics, reinforcing the importance of anomaly-based detection over traditional ...
CrowdStrike 2025 APJ eCrime Landscape Report: Chinese Underground Marketplaces Drive Billions in Illicit Transactions; AI-accelerated Ransomware Surges
Chinese-speaking actors evade government restrictions and solicit criminal services through anonymized marketplaces; AI-accelerated ransomware operations signal next evolution of threats
DroneShield Strengthens Technology Leadership Team
DroneShield has announced the appointment of Angus Harris to the role of Chief Technology Officer (CTO). This appointment reflects the Company’s continued growth and organisational maturity as it scales to meet accelerating global demand across defence and government markets. Mr. Harris brings a wealth of technical and leadership experience from his ...
Quorum Cyber Named CyberSecurity Breakthrough’s Managed Security Service Provider of the Year 2025
This latest award closely follows several other accolades for Quorum Cyber this year, including being named Security MSSP of the Year in the Microsoft Security Excellence Awards 2025, winning the Cybersecurity Company of the Year award at the 2025 Scottish Cyber Awards, and being named a finalist in the Cyber Security Team of the Year category at the ...
Camelot Secure and DigiFlight Win Top Honors at Maryland’s Cybersecurity Association 2025 Cybersecurity Awards
The high-profile recognition reflects Camelot Secure’s groundbreaking work in fostering new pipelines of cybersecurity talent through its partnerships with Universities and Historically Black Colleges and Universities (HBCUs). These initiatives empower students through real-world projects, capstones, internships, and hands-on use of Camelot Secure’s ...
Extortion and Ransomware Drive Over Half of Cyberattacks
In the first half of 2025, Microsoft data showed Australia ranked 10th globally among countries where customers were most frequently impacted by cyber activity.
BeyondTrust Named a Leader in 2025 Gartner Magic Quadrant for Privileged Access Management
BeyondTrust positioned highest for Ability to Execute, combined with its Completeness of Vision, contributed to its position as a Leader in this year’s report
We believe placement in the Leaders Quadrant reflects BeyondTrust’s identity-first approach to protecting Paths to Privilege™ across hybrid, multicloud, and AI-driven environments
CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management
CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management1. Recognised as a Leader for the seventh consecutive time, CyberArk is positioned furthest in Completeness of Vision which, from the company's standpoint, reflects CyberArk's ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
