The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Introduction Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity industry. In this article, we will delve into the dynamics of M&A within the cybersecurity sector, exploring both successful and unsuccessful instances. Additionally, we will provide insights for start-up and mid-market businesses ...
The New Ransomware Threat Targeting Global Institutions

The New Ransomware Threat Targeting Global Institutions

The British Library falls victim to Rhysida, a ransomware group employing a "double extortion" tactic. With global ambitions and sophisticated techniques, Rhysida poses a significant threat to institutions worldwide. The rise of ransomware payments and cybercriminal sophistication is cause for concern. Stay tuned for more on Rhysida in our upcoming ...
Future of Work Predictions 2024

Future of Work Predictions 2024

With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year. Prediction: AI Will Be Your Best Work Buddy One of the most exciting ideas for workplace productivity is the deployment of AI assistants that help employees become — and continue to be — efficient and effective. For example, ...
A Human Centric Tech Revolution in 2024

A Human Centric Tech Revolution in 2024

With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence. Work Needs To Revolve Around Humans, Not The Other Way Around Productivity ...
Businesses Need To Rewrite Their Identity Security Playbook For 2024

Businesses Need To Rewrite Their Identity Security Playbook For 2024

With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...

Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel

In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President & Chief Product Officer, shed light on the company's significant announcements and the profound advancements in the field of cybersecurity. Patel's insights underscore the pivotal role of artificial intelligence (AI) in revolutionising security, carving a ...
A Legal Take On The Cybersecurity Strategy 2023-2030

A Legal Take On The Cybersecurity Strategy 2023-2030

The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For ...
Battling Cyber Scams: Traditional Algorithms Won’t Cut it

Battling Cyber Scams: Traditional Algorithms Won’t Cut it

Australians have experienced a surge in scams, with losses amounting to a staggering $3.1 billion in the past year alone. From a cybersecurity perspective, traditional anti-fraud analytics won’t stem the rising tide of scams. FICO's Vaile Mexted shares five key considerations for the finance sector as it faces an urgent imperative to fortify defences ...
No results found.

In The News

Tenable Research Uncovers Remote Code Execution Vulnerability in Oracle Code Editor and its Integrated Services

Tenable Research Uncovers Remote Code Execution Vulnerability in Oracle Code Editor and its Integrated Services

Tenable, the exposure management company, has identified a Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure (OCI) Code Editor, a service designed for developers working within Oracle’s Cloud Shell ecosystem. This vulnerability could have allowed attackers to run malicious code on a server without needing direct access. The ...
77% of Australian Organisations Rely on MSPs to Manage the Security Challenges of Growth

77% of Australian Organisations Rely on MSPs to Manage the Security Challenges of Growth

New Research Shows Australian Companies Struggle with IT Complexity, Spiraling Tool Sprawl and Evolving Strategies
Check Point Launches Quantum Spark 2500 Series to Deliver Enterprise-Grade Security and Future-Ready Connectivity for Small and Medium Businesses

Check Point Launches Quantum Spark 2500 Series to Deliver Enterprise-Grade Security and Future-Ready Connectivity for Small and Medium Businesses

New lineup introduces Wi-Fi 7, 5G, AI-powered threat prevention, and streamlined management, that helps small and medium businesses stay secure, connected, and resilient
CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category

CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category

Advanced capabilities help implement identity-first security for agentic AI at scale
Datadog and AWS Enhance Region’s Infrastructure for A/NZ Compliance and Security

Datadog and AWS Enhance Region’s Infrastructure for A/NZ Compliance and Security

Local data storage capacity allows Datadog’s customers and partners to meet data residency and security requirements across A/NZ
CIOSO Global Founding Partner Greg Sullivan Joins Technology Partners

CIOSO Global Founding Partner Greg Sullivan Joins Technology Partners

Greg will coach CIOs, CISOs, and other senior technology and cybersecurity executives through leadership transitions and cyber-risk inflection points. With decades of executive-level cybersecurity expertise, Greg brings a unique blend of strategic insight and operational expertise that will help our clients build resilient, future-ready organizations.
Okta and Palo Alto Networks Unify AI-Driven Security to Fight Identity Attacks

Okta and Palo Alto Networks Unify AI-Driven Security to Fight Identity Attacks

Joint solutions help reduce the risk of breaches by preventing unauthorised access and mitigating dangerous security blindspots
Nutanix Study Finds Financial Services Fast-Tracking GenAI Adoption—but Long-Term Gains Hinge on Infrastructure and Talent

Nutanix Study Finds Financial Services Fast-Tracking GenAI Adoption—but Long-Term Gains Hinge on Infrastructure and Talent

Sydney, NSW., July 16, 2025 – Nutanix (NASDAQ: NTNX), a leader in hybrid multicloud computing, announced the findings of its seventh annual global Financial Services Enterprise Cloud Index (ECI) survey and research report, which measures enterprise progress with cloud adoption in the industry. The research showed that nearly all the financial services ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This