The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Nozomi Networks Predicts Major A/NZ Critical Infrastructure Cybersecurity Uplift in 2024
Experts in Australia and New Zealand predict critical infrastructure owners will enhance operational technology security as legislative changes take shape, but skills shortages and visibility over networks remain key issues.

Australian Government Launches Comprehensive Cybersecurity Strategy to Protect National Economy
The Australian government has recently unveiled a new cybersecurity strategy designed to bolster the nation's cyber capabilities and protect the economy and its citizens from cyber threats. The policy, led by Minister Clare O'Neil, seeks to make Australian entities harder targets, and to enable faster recovery from cyber attacks.
The government aims ...
Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data
With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo
It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity
A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.

The Unspoken Voice – CFOs Perspective On Security
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...

Cybersecurity Implications of Cryptocurrency and Blockchain Technology
Introduction
This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...

Can Being “Compliant” Ever Top Being “Secure”?
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
No results found.
In The News
$61.6m European Military Contract
DroneShield Limited (ASX: DRO) has received a package of three standalone follow-on contracts for $61.6 million from its privately owned in-country European reseller that is contractually required to distribute the products to a European military customer. The contracts are for handheld detection and counterdrone systems and associated accessories. ...
ManageEngine Launches MSP Central: A Platform Built For Strengthening Modern MSP Infrastructure
Built in-house, MSP Central enables MSPs to centralise service workflows, device control, threat protection, and performance monitoring in a single platform
Manage clients securely with integrated RMM, PSA, and advanced server monitoring on a multi-tenant, role-based platform
Boost technician productivity with AI-driven ticket insights, ...
Global Cybersecurity Professionals Cite Top Threats, Concerns, and Challenges In New Bitdefender Report
Bitdefender has released the 2025 Cybersecurity Assessment Report, an annual report based on an independent survey and analysis of cybersecurity professionals revealing the most urgent concerns, key challenges, and threat perceptions shaping enterprise security.
The report is based on an independent survey and analysis of over 1,200 IT and security ...
Nearly Half of Australian Companies Opt to Pay the Ransom, Sophos Report Finds
Australian median ransom demand is US$217,000; yet 52% of Australian companies negotiated a lower amount than the initial demand
Infoblox Recognised As A Great Place To Work In Australia
Infoblox recognised as a great place to work, where employees are treated fairly regardless of gender or sexual orientation by Great Place to Work.
BeyondTrust Signs Strategic Collaboration Agreement With AWS To Drive Secure Identities Across AWS Cloud
A deeper collaboration empowers joint customers to quickly accelerate secure cloud adoption and scale identity security across hybrid environments
BeyondTrust’s Pathfinder allows unified identity security and AI-driven protection aligned with AWS security best practices
Atlanta, GA – June 24, 2025 – BeyondTrust, the global leader in identity ...
Teradata Delivers Private AI Innovation In New Offering: Teradata AI Factory – Purpose-Built, On-Premises Product With NVIDIA Comes Ready-To-Run And Delivers Trustworthy AI With Predictable Pricing, Security, Governance, And Compliance
Teradata (NYSE: TDC) today announced the launch of Teradata AI Factory, an integrated solution that brings Teradata’s cloud-based AI/ML capabilities - including predictive, generative, and agentic AI – to secure, on-premises deployments.
AI Factory unifies critical components like data pipelines, algorithm execution, and software infrastructure into ...
Rapid7 Puts Agentic AI To Work In The SOC, Empowering Analysts To Investigate Smarter And Faster
Rapid7 has announced the integration of agentic AI workflows into its MDR services to support threat investigation processes within Security Operations Centres (SOCs). These AI-driven workflows autonomously handle foundational investigative tasks, enabling analysts to focus on more complex threats and strategic decision-making.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
