The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM may be the infosec pressure relief valve Australia’s finance sector needs

PAM may be the infosec pressure relief valve Australia’s finance sector needs

Information security is a journey, but calls of, ‘Are we there yet?’ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.
DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.
Four steps organisations can take to improve cybersecurity awareness

Four steps organisations can take to improve cybersecurity awareness

October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).
Five common challenges with securing cloud-based applications

Five common challenges with securing cloud-based applications

The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.
The overlap between physical and digital security – how to get smart with compliance

The overlap between physical and digital security – how to get smart with compliance

Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of ...
Espionage Fuels Global Cyberattacks

Espionage Fuels Global Cyberattacks

In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
No results found.

In The News

Check Point Accelerates Threat Detection and Response with AI-Powered Security Management for the Modern Enterprise

Check Point Accelerates Threat Detection and Response with AI-Powered Security Management for the Modern Enterprise

Next-generation Smart-1 Management Appliances boost efficiency delivering 2X expansion in managed gateways and AI-powered tools for automation, policy insights, and orchestration
Bitdefender Enhances Global Channel Program for Resellers and Managed Service Providers

Bitdefender Enhances Global Channel Program for Resellers and Managed Service Providers

Bitdefender today announced major enhancements to its Partner Advantage Network – Reselling Channel Partner Program and Managed Service Provider (MSP) Partner Program. The updates are designed to maximise revenue opportunities, streamline partner engagement, and further strengthen support for the channel and MSP community. The program introduces a new ...
SailPoint Research Highlights Rapid AI Agent Adoption, Driving Urgent Need For Evolved Security

SailPoint Research Highlights Rapid AI Agent Adoption, Driving Urgent Need For Evolved Security

SailPoint, Inc. . (Nasdaq: SAIL), a leader in unified identity security for enterprises, today released a new research report titled ‘AI agents: The new attack surface. A global survey of security, IT professionals and executives.’ The report highlights an urgent need for improved identity security as AI agents gain widespread adoption.
69% of Organisations Breached by Ransomware Over Past Year, Delinea Report Finds

69% of Organisations Breached by Ransomware Over Past Year, Delinea Report Finds

AI accelerates both attacks and defences, but critical security gaps persist SYDNEY, May 29, 2025 - Delinea, a pioneering provider of solutions for securing human and machine identities through centralised authorisation, has unveiled new research highlighting how ransomware attacks have continued to surge over the past year, despite fewer victims ...
Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organisations’ Cyber Attack Surface

Veriti is the first to introduce pre-emptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments 
Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

Trend Micro Offers Enterprise AI Security Platform Across Data in Cloud Or On Premises

AI security solution integrated with NVIDIA Enterprise AI Factory validated design  SYDNEY, MAY 20, 2025 – Global enterprise cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) today announced its bringing powerful and simplified security capabilities to NVIDIA Enterprise AI Factory validated design, helping organisations worldwide ...
Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic Brings Hybrid Retrieval to Microsoft Semantic Kernel

Elastic is the first vector database to support blended text and semantic retrieval techniques for .NET developers for more relevant, accurate results for search queries
ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research APT Report: Russian cyberattacks in Ukraine intensify; Sandworm unleashes new destructive wiper

ESET Research has released its latest APT Activity Report, which highlights activities of select APT groups that were documented by ESET researchers from October 2024 through March 2025.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This