The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications
APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...

Cybersecurity Challenges and the Need for a Mindset Shift
In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense
In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...

Australia’s New Defence Technology Law: A Strategic Move or a Threat to Global Collaboration?
Australia is poised to enact a new law that imposes stringent regulations on sharing defence technology with foreign entities, with the notable exception of its AUKUS partners, Britain and the United States. This significant move is designed to align with U.S. export controls on defence technology, a critical component of the AUKUS plan to construct ...

Insights from Cisco Live: What’s Cooking?
The recent Cisco Live event in Melbourne 2023, provided a platform for industry leaders to discuss the critical cybersecurity challenges facing our industry. The noted event included prominent figures from Cisco and other industry experts, shedding light on the complexities, innovations, and pressing issues within the cybersecurity sphere.
A ...

Communication Is Key to IT Security
The growing scope and severity of cyber threats targeting Australian businesses this past year has put a spotlight on the need for greater security measures. With more attention and support, now is the time for companies of all sizes to bolster their preparedness against emerging threats – and opening up internal dialogues across the business will be ...

Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry
Partnerships play a vital role in meeting customer demands and driving success for organisations. In a recent episode of the KBKast podcast, host Karissa Breen sat down with Raj Sharma, from Palo Alto Networks, to discuss the importance of strategic partnerships and the changing dynamics of the reseller ecosystem. From the rise of direct ...

The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity
Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most cyber secure nation by 2030. However, according to Apple, Australia is one of the top four countries for cyber-attacks - behind the US, the UK and Canada. With the government playing an increasingly proactive, and prominent role in ...
No results found.
In The News
JFrog Enables AI-Driven Developer Workflows with Robust MCP Server
JFrog’s Model Context Protocol (MCP) server allows developers to seamlessly employ AI-agents across the JFrog Platform, enabling faster, more reliable, secure software development & delivery at scale
Figma Deepens Local Roots In Australia With Local Data Hosting and More
Figma introduces new governance features for enterprise customers, with local data residency expected later this year.
ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship
The scholarship is part of ESET’s broader commitment to closing the gender gap in cybersecurity, an industry that remains disproportionately male, despite growing awareness of the need for diverse perspectives. With an estimated 5,000 additional cybersecurity professionals needed each year to meet national targets, programs like this play a vital role ...
Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities through AI Innovation
Seasoned technologist and former Trigo CTO to lead Check Point’s global cyber security and AI strategy and AI centres
ROLLER Achieves 60% Cloud Savings and Improved Reliability with Datadog
Sydney, Australia – July 22, 2025 – Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today announced ROLLER, an Australian-founded software company for attractions, has streamlined operations, improved availability, and reduced cloud infrastructure costs using the Datadog platform.
ROLLER is the software ...
BioCatch delivers Scams360 to help banks advance detection of emerging scam types
Single, streamlined platform defends against full spectrum of scams
Check Point Software Infinity Global Services Earns CREST Accreditation for Penetration Testing, Setting a New Standard in Cyber Security Testing Excellence
Accreditation affirms Check Point’s commitment to high-assurance, ethical and globally validated penetration testing services
F5 and MinIO Expand Strategic Partnership to Power High-Performance, Secure, and Scalable Data Pipelines for AI Factories
Solution combines F5 Application Delivery and Security Platform (ADSP) with MinIO AIStor Enterprise Edition to augment AI performance, scalability, and reliability
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
