The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Data Resilience in the Age of Cyber Warfare: A Seven-Layered Approach
The impact of cyberattacks extends far beyond data loss. Modern attackers target not just the data itself, but also the configuration files and datasets critical for recovery. This significantly hinders restoration efforts, forcing organisations into a difficult decision: pay the ransom or risk losing vital data and facing significant downtime. To ...

Five Ways Enterprises Can Build Cyber Resilience With a Safety-first Approach
Digital resilience is critical to protect operations, reputation, customers, and business transformations. It requires being able to look the threats straight in the eye, understand them deeply, and deal with them effectively. While it is impossible to predict exactly when, how, and where the next threat will come from, it is possible to deal with ...

Australian Federal Budget – What’s in the Bag?
On Tuesday 14th May, Treasurer Jim Chalmers and Minister for Finance Katy Gallagher announced Australia’s Federal budget. Labeled a "responsible Budget that assists those under pressure today," the Treasurer has predicted a second straight surplus of $9.3 billion.
The Government's key priorities in this Budget are addressing the cost of living, ...

Understanding the Growing Cybersecurity Threats and Challenges With Mark Anderson
In a recent episode of the KBKast, host Karissa Breen dove into details about current cyber landscape and critical cybersecurity challenges pertinent to small and medium businesses. The Microsoft executive, Mark Anderson. Anderson's extensive knowledge and illuminating known perspectives on the intricacies of cybercrime, the critical role of proactive ...

The Three Ways Australian Infrastructure Operators Are Converging Physical and IT Security Functions
Convergence can be significantly aided by having a physical security function that ‘leans into’ the change and has appropriate support systems in place.

How Disjointed Identities Have Become a Significant Security Threat
The proliferation of disjointed identities poses a significant threat to modern organisations. By embracing a unified identity security approach, they can gain a comprehensive view of their identity landscape, proactively manage risks, and prevent costly breaches.

How the Security of Critical Infrastructure (SOCI) Act Is Strengthening Australia’s Critical Infrastructure Cybersecurity Posture
Critical infrastructure – including healthcare, financial infrastructure, telecommunications, energy infrastructure, water assets and more – are vital to Australia's national growth, underpinning social and economic prosperity.

Don’t Be the Weakest Link in the Ongoing Battle Against Phishing Attacks
The release of the Australian Competition and Consumer Commission’s (ACCC) 2023 Targeting scams report may come with a sigh of relief. Despite predictions that Australians would lose more than AUD 3.15 billion to scams in 2023, it appears that the combined losses reported for the year were $2.74 billion, a 13% decrease from 2022, the report ...
No results found.
In the News
Fortinet Launches Secure AI Data Centre Solution to Protect Models, Data, and Infrastructure at Scale
Featuring new ASIC-powered FortiGate 3800G and enhanced data and threat protection for large language models, Fortinet delivers the industry’s first end-to-end security framework for AI data centres
Ping Identity Launches ‘Identity for AI’ Solution to Power Innovation and Trust in the Agent Economy
Helping enterprises close the AI trust gap through identity-first accountability.
VAST Data Secures Commercial Partnership Deal With CoreWeave for US$1.17 Billion to Power the Next Generation of AI
VAST Data today announced it has signed a commercial agreement valued at US$1.17 billion with CoreWeave. The expanded partnership reinforces CoreWeave’s long-standing commitment to the VAST AI OS as its primary data foundation, solidifying VAST as a key component of CoreWeave’s AI cloud.
Powered by the VAST AI OS, CoreWeave’s infrastructure delivers ...
Barracuda Launches AI-Powered Assistant to Simplify Security Operations
New Barracuda Assistant Transforms Security Operations, delivers Smarter, Faster Security to Strengthen Cyber Resilience and Drive Productivity and ROI
Nozomi Networks Strengthens Its Commitment to Its Global Partner Ecosystem With Latest Executive Appointments
• Matthew Cowell joins as Vice President of Strategic Alliances. • Tyson Gerhold Named Vice President of Global Partner and Channel Sales.
Seven Critical Vulnerabilities Open ChatGPT to Data Theft and Hijacking
Tenable research reveals hidden AI flaws that allow data exfiltration, safety override, and persistent compromise within ChatGPT
Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test
As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition
ASUG Tech Connect 2025 Taps SecurityBridge to Discuss SAP Cybersecurity Strategies
The SecurityBridge presentation aligns with the technical education focus by detailing the use of context- and risk-based multi-factor authentication (MFA) and step-up authentication via TrustBroker, along with security monitoring, vulnerability management, and incident response practices. In addition, the speakers will also discuss integrating ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
