The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing – Industry Commentary from Tenable

Credential Stuffing – Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australia’s Water Utilities

Improving Cybersecurity Within Australia’s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
No results found.

In The News

AI-Generated Media Drives Real-World Fraud, Identity Theft, and Business Compromise

Trend Micro uncovers the criminal playbook for deepfake-enabled cybercrime
HID and ASSA ABLOY Recognised with Renowned Red Dot Award for Innovative Biometric eGate Design

HID and ASSA ABLOY Recognised with Renowned Red Dot Award for Innovative Biometric eGate Design

Combining an Aesthetically Appealing Design, Function and Innovation, the BG100 Speedgate Sets New Benchmark for Passenger Experience in Air Travel
State of Data Readiness – Report Suggests Large Gap Between Expectation And Reality

State of Data Readiness – Report Suggests Large Gap Between Expectation And Reality

A new report released by Commvault has revealed a significant gap between perceived and actual cyber readiness among Australian and New Zealand (ANZ) organisations—raising alarm bells for boards and business leaders across the region.
Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data

Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data

Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data New Solution Protects Against Accidental and Malicious Data Loss, Ensures Business Continuity and Strengthens Cyber Resilience
Cisco Appoints Ben Dawson as New SVP for APJC Sales and APJC President

Cisco Appoints Ben Dawson as New SVP for APJC Sales and APJC President

Singapore, July 9, 2025 – Cisco, the worldwide technology leader, today announced the appointment of Ben Dawson as the new President for its Asia Pacific, Japan and Greater China (APJC) business, succeeding Dave West. He will report to Oliver Tuszik, Executive Vice President of Global Sales and Chief Sales Officer, effective Monday, July 28, ...
Sophos Managed Risk Expands Capabilities with Internal Attack Surface Management (IASM) to Identify and Guide Organisations to Mitigate Internal Vulnerabilities

Sophos Managed Risk Expands Capabilities with Internal Attack Surface Management (IASM) to Identify and Guide Organisations to Mitigate Internal Vulnerabilities

Expands Visibility of Internal Exposures within an Organisation’s Environment
Excite Technology Services Closes More Than $3 million In June, Continuing Growth Momentum

Excite Technology Services Closes More Than $3 million In June, Continuing Growth Momentum

Excite Technology Services has closed out the financial year with its strongest monthly performance to date, securing more than $3 million through June in new deals across its cyber security, digital forensics, and training service lines. 
Wavelink Signs Distribution Agreement with Cloudian to Support Growing Demand for Artificial Intelligence-ready, Cloud-native Storage Solutions

Wavelink Signs Distribution Agreement with Cloudian to Support Growing Demand for Artificial Intelligence-ready, Cloud-native Storage Solutions

July 08, 2025 – Wavelink, an Infinigate Group company and leader in technology distribution, services, and business development in Australia and New Zealand, has signed a distribution agreement with Cloudian, a global leader in S3-compatible file and object storage. Under the agreement, Wavelink will distribute Cloudian’s portfolio throughout ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This