The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach

The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...
Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach

Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...
Australian Federal Budget – What’s in the Bag?

Australian Federal Budget – What’s in the Bag?

On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion. The Government's key priorities in this Budget are addressing the cost of living, ...
Understanding the Growing Cybersecurity Threats and Challenges With Mark Anderson

Understanding the Growing Cybersecurity Threats and Challenges With Mark Anderson

In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...
The Three Ways Australian Infrastructure Operators Are Converging Physical and IT Security Functions

The Three Ways Australian Infrastructure Operators Are Converging Physical and IT Security Functions

Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.
How Disjointed Identities Have Become a Significant Security Threat

How Disjointed Identities Have Become a Significant Security Threat

The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.
How the Security of Critical Infrastructure (SOCI) Act Is Strengthening Australia’s Critical Infrastructure Cybersecurity Posture

How the Security of Critical Infrastructure (SOCI) Act Is Strengthening Australia’s Critical Infrastructure Cybersecurity Posture

Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity.
Don’t Be the Weakest Link in the Ongoing Battle Against Phishing Attacks

Don’t Be the Weakest Link in the Ongoing Battle Against Phishing Attacks

The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses reported for the year were $2.74 billion, a 13% decrease from 2022, the report ...
No results found.

In the News

Cisco Debuts New Unified Edge Platform for Distributed Agentic AI Workloads

Cisco Debuts New Unified Edge Platform for Distributed Agentic AI Workloads

Cisco Unified Edge extends data center power and scale to the edge, enabling real-time applications and AI inferencing where data is generated. | Cisco is first-to-market with an edge optimized platform that’s more than a server - integrating compute, networking, and storage into a single system backed by an extensive partner ecosystem. | The new ...
Ping Identity Strengthens Defence Against AI-Driven Impersonation With Privacy-Preserving Biometrics

Ping Identity Strengthens Defence Against AI-Driven Impersonation With Privacy-Preserving Biometrics

Signs agreement to acquire Keyless, expanding privacy-first authentication across the entire user journey.
Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

The awards recognise outstanding innovation and service excellence from MSPs and IT professionals across the Asia Pacific region.
Camelot Secure CEO Stan Oliver Named One of the Daily Record’s 2025 Most Admired CEOs

Camelot Secure CEO Stan Oliver Named One of the Daily Record’s 2025 Most Admired CEOs

Oliver’s recognition reflects a career defined by both innovation and inclusivity. Since founding Camelot Secure in 2022, he has spearheaded pioneering work in Advanced Persistent Threat (APT) Hunting, Attack Surface Management, Penetration Testing, and Threat Detection & Incident Response. Under his leadership, the company has also developed ...
Lakera Launches Open-Source Security Benchmark for LLM Backends in AI Agents

Lakera Launches Open-Source Security Benchmark for LLM Backends in AI Agents

SAN FRANCISCO and ZURICH - October 27, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, and Lakera, a world leading AI-native security platform for Agentic AI applications, with researchers from The UK AI Security Institute (AISI), have announced the release of the backbone breaker ...
Tech Professionals in Oceania Brace for a Year of AI Risks, Regulation and a Focus on Business Continuity

Tech Professionals in Oceania Brace for a Year of AI Risks, Regulation and a Focus on Business Continuity

ISACA’s 2026 Tech Trends & Priorities Pulse Poll reveals the top threats and pressures keeping Oceania’s digital trust professionals awake at night
Cloudian HyperScale AI Data Platform Powered by NVIDIA Unlocks Sovereign AI

Cloudian HyperScale AI Data Platform Powered by NVIDIA Unlocks Sovereign AI

Cloudian is enabling governments, enterprises, and service providers worldwide to develop sovereign AI projects within their national borders, using its proven S3-compatible storage platforms. With Cloudian HyperStore for AI data management and the Cloudian HyperScale AI Data Platform – which integrates NVIDIA accelerated computing, networking and ...
Rapid7 Accelerates Exposure Remediation With AI-Generated Risk Insights and Enhanced Vulnerability Intelligence

Rapid7 Accelerates Exposure Remediation With AI-Generated Risk Insights and Enhanced Vulnerability Intelligence

Rapid7 has announced new AI-generated risk-intelligence features within its Command Platform. The upgrade introduces plain-language risk summaries in Remediation Hub, combining exploit signals, asset criticality, and threat-intelligence to help security teams prioritise faster.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This