The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity
It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia
Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.
Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.
This event was hosted ...

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)
As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you from becoming a victim. High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. In the following article, we will showcase a range of real-world phishing ...

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)
We already know that phishing is a significant threat to businesses and individuals. Anti-phishing tips, such as “always hover over the link in an email before clicking” or “be wary of emails with poor grammar”, are meant to help us avoid being tricked by phishing emails. These tips have been circulating on the internet for over a decade, but sadly, ...

The Security Operations Centre (SOC)
So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...

The Security Operations Centre (SOC)
So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...

Hipster, Hacker & Hustler, meet Handler
Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.

5 Reasons Why You Shouldn’t Just Build the Solution
For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
No results found.
In The News
Claroty Wins Best in KLAS Award for Healthcare IoT Security Five Years in a Row
In rare five-year winning streak, Claroty xDome recognised by KLAS Research as highest-rated IoT security solution by healthcare customers
Verizon Business Appoints Mark Trumble to Lead Cybersecurity Sales for Asia-Pacific
Sydney, AUSTRALIA – Verizon Business today announced the appointment of Mark Trumble as Head of Cybersecurity Sales for the Asia-Pacific region. Mark will lead a team of regional cybersecurity specialists dedicated to addressing the increasingly complex security requirements of Verizon’s enterprise and government clients.
Backed by one of the ...
Kaseya Report Outlines Top Trends in Backup and Recovery in 2025
AUSTRALIA, 10 February 2025 — Kaseya, the leading global provider of AI-powered cybersecurity and IT management software, released today The State of Backup and Recovery Report 2025: Navigating the Future of Data Protection. The survey of over 3,000 IT professionals worldwide reveals the importance of data protection and the increased need for robust ...
Fortinet Opens New Company-Owned Headquarters In Australia, Strengthening Global Reach And Advancing Enterprise Customer Experiences
The building marks Fortinet’s first Innovation Hub in the Asia-Pacific, featuring a state-of-the-art data centre and a Technical Assistance Centre, along with a dedicated training facility designed to drive innovation, collaboration, and growth
For the Third Consecutive Year, Check Point Software Demonstrates Industry’s Highest Threat Prevention Rate in Miercom’s Enterprise and Hybrid Mesh Firewall Security Report
Check Point’s Infinity Platform offers the best protection against the latest generation of cyberattacks, with a block rate of 99.9% on new malware, 99.7% phishing prevention rate, and 98% average block rate on high & critical intrusion events
Rapid GenAI Application Adoption Drives New Era of Application and Infrastructure Modernisation
Nutanix study reveals that GenAI is changing organisations priorities, with security and privacy being a primary concern
Pax8 Adds Foxit’s Innovative PDF and eSignature Solutions to its Cloud Marketplace
SYDNEY, AU (February 6, 2025) – Pax8, the leading cloud commerce marketplace, has added new offerings to the Pax8 Marketplace from Foxit, a leading provider of innovative PDF and eSignature products and services. With Foxit's advanced document management technology now available in the marketplace, Pax8’s global network of partners can now access ...
Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads
Bitdefender Labs has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers.
LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..