The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach
The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach
Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...

Australian Federal Budget – What’s in the Bag?
On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion.
The Government's key priorities in this Budget are addressing the cost of living, ...

Understanding the Growing Cybersecurity Threats and Challenges With Mark Anderson
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...

The Three Ways Australian Infrastructure Operators Are Converging Physical and IT Security Functions
Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.

How Disjointed Identities Have Become a Significant Security Threat
The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.

How the Security of Critical Infrastructure (SOCI) Act Is Strengthening Australia’s Critical Infrastructure Cybersecurity Posture
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity.

Don’t Be the Weakest Link in the Ongoing Battle Against Phishing Attacks
The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses reported for the year were $2.74 billion, a 13% decrease from 2022, the report ...
No results found.
In the News
Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package With 2m Weekly Downloads
JFrog Security Research team demonstrates CVE-2025-11953 allows unauthenticated attackers to remotely execute code on developers’ machines, putting organisations at risk
SAP and Snowflake Unleash the Power of Data and Enterprise AI Across the Business Data Fabric
New partnership empowers organisations with access to rich data insights required to power AI apps that accelerate businesses outcomes
Delinea Expands OEM Agreement With IBM to Deliver Privileged Identity and Access Management Capabilities
AUSTRALIA – 5 November, 2025 – Delinea, a pioneering provider of solutions for securing human and machine identities through centralised authorisation, today announced the expansion of its OEM agreement with IBM to make the full Delinea Platform available to IBM customers.
This new agreement deepens a strategic collaboration that began between the two ...
More Than Half (58%) of Retailers Hit by Ransomware Pay the Ransom, Sophos Finds
Sophos today released its fifth annual Sophos State of Ransomware in Retail report, a vendor-agnostic survey of IT and cybersecurity leaders across 16 countries. This year’s report reveals that nearly half (46%) of retail ransomware incidents were traced to an unknown security gap, underscoring ongoing visibility challenges across the retail attack ...
Snowflake Announces New Product Innovations to Accelerate the Development of Enterprise-Grade Agentic AI Apps
• Snowflake Intelligence is now generally available, equipping organisations to democratise data and AI across their business • New advancements to Snowflake Horizon Catalog and Snowflake Openflow enable enterprises to make all their data accessible for AI agents • New suite of developer tools to supercharge agentic AI, enabling developers to deploy AI ...
Cisco 360 Partner Program Empowers Partners to Drive Profitability in an AI Era
• Program Evolution: Launching January 25, 2026, the Cisco 360 Partner Program builds on 20+ years of industry-leading partnerships and was co-designed with partners to enhance customer value.
• Profitability: New Cisco Partner Incentive bonuses reward portfolio breadth and depth of specialized expertise, with the Partner Value Index and enhanced ...
Elastic Brings LLM Observability to Azure AI Foundry to Optimize AI Agents
Developers on Azure AI Foundry can now quickly identify bottlenecks, optimize configurations and improve reliability of agentic AI applications
EY Selects CrowdStrike Falcon Next-Gen SIEM to Power Global Cybersecurity Managed Services
Expanded collaboration makes Falcon Next-Gen SIEM the foundation of EY global cyber managed services for security and non-security data, accelerating AI-driven security transformation for clients
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
