The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Building Resilience in Australia’s Critical Infrastructure With AI-Enhanced Surveillance

Building Resilience in Australia’s Critical Infrastructure With AI-Enhanced Surveillance

In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the functioning of a society, so it is vital that those providing these services can maintain business continuity. Australia, with its vast and diverse landscape, faces unique challenges in ...
Overcoming Australia’s Faceless Threat: Identity Crime

Overcoming Australia’s Faceless Threat: Identity Crime

While identity theft is often considered a consumer issue, its impact is being felt more and more by businesses, especially in the wake of major data breaches. In response, businesses have increasingly adopted strict security strategies, and more recently, the government has introduced the Digital ID Bill to the Senate. But what does this mean for ...
A Changing of the Guard: Women in Security

A Changing of the Guard: Women in Security

“The increasing presence of women in tech and leadership roles is encouraging. The current skills shortage offers a great opportunity for women to step in and fill the gaps. For those eyeing careers in technology, whether it be coding, cybersecurity, data analysis, or design, I encourage you to embrace curiosity and chart your own course. Celebrating ...
How Decentralised ID Management Can Boost Data Privacy

How Decentralised ID Management Can Boost Data Privacy

With the proportion of daily life conducted online continuing to grow, adopting a decentralised approach to identity management makes increasing sense.
Including the Newcomers: Why I’m Laser Focused on Paying IT Forward

Including the Newcomers: Why I’m Laser Focused on Paying IT Forward

Women who’ve benefitted from effective advocacy and support know what a difference it can make in the early career days.
Five Ways to Include More Women in Your ICT Organisation

Five Ways to Include More Women in Your ICT Organisation

There’s lots that companies can do to create workplaces that appeal to ambitious, high performing women.
Navigating Fair Compensation Like a Main Character

Navigating Fair Compensation Like a Main Character

Unpaid Expertise: Navigating the Challenges of Being Asked to Work for Free
Leadership That Empowers

Leadership That Empowers

Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.
No results found.

In the News

New SolarWinds Report: Gen AI Significantly Drops Incident Response Time for ITSM Teams

New SolarWinds Report: Gen AI Significantly Drops Incident Response Time for ITSM Teams

Findings show a path to more effective and efficient ITSM operations through generative AI
Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

As organisations race to adopt artificial intelligence, the world’s cybersecurity leaders are being forced to rethink their entire defensive playbook. New research from Gigamon reveals that as AI reshapes how businesses innovate and how adversaries operate, chief information security officers (CISOs) are recalibrating their risk strategies to meet a ...
Malaysia Expands Deployment of BlackBerry Secure Communications for the  46th and 47th ASEAN Summits

Malaysia Expands Deployment of BlackBerry Secure Communications for the 46th and 47th ASEAN Summits

Malaysia modernizes mobile command and control, securing voice and messaging for inter-agency coordination with BlackBerry AtHoc and BlackBerry SecuSUITE
Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Today, Sophos announced the launch of Sophos Identity Threat Detection and Response (ITDR). This new solution for Sophos XDR and Sophos MDR continuously monitors customer environments for identity risks and misconfigurations and scans the dark web for compromised credentials. It enables organizations to detect and respond to identity-based attacks ...
Splunk Report Shows Observability Is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Splunk Report Shows Observability Is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Cisco today announced the release of the Splunk State of Observability 2025: The Rise of a Business Catalyst report, marking its fifth annual analysis into the evolving landscape of observability. This year's research highlights the critical role observability plays in delivering business value – from elevating customer experience and boosting employee ...
KBI.Media Announces Season Two of Destination Cyber, With New Host Chaahat Baghla

KBI.Media Announces Season Two of Destination Cyber, With New Host Chaahat Baghla

Sydney, Australia - Oct 21st - KBI.Media is proud to announce the launch of Destination Cyber: Season Two, featuring new host Chaahat Baghla, a rising cybersecurity voice and final-year student at Macquarie University, where she is completing a Bachelor of Cybersecurity. Baghla brings a student’s perspective and professional curiosity to the platform, ...
Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salt Typhoon, a China-linked cyber espionage group, has been observed targeting global infrastructure using stealthy techniques such as DLL sideloading and zero-day exploits. Darktrace recently identified early-stage intrusion activity consistent with Salt Typhoon’s tactics, reinforcing the importance of anomaly-based detection over traditional ...
CrowdStrike 2025 APJ eCrime Landscape Report: Chinese Underground Marketplaces Drive Billions in Illicit Transactions; AI-accelerated Ransomware Surges

CrowdStrike 2025 APJ eCrime Landscape Report: Chinese Underground Marketplaces Drive Billions in Illicit Transactions; AI-accelerated Ransomware Surges

Chinese-speaking actors evade government restrictions and solicit criminal services through anonymized marketplaces; AI-accelerated ransomware operations signal next evolution of threats
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This