The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
Australia’s New Defence Technology Law: A Strategic Move or a Threat to Global Collaboration?

Australia’s New Defence Technology Law: A Strategic Move or a Threat to Global Collaboration?

Australia is poised to enact a new law that imposes stringent regulations on sharing defence technology with foreign entities, with the notable exception of its AUKUS partners, Britain and the United States. This significant move is designed to align with U.S. export controls on defence technology, a critical component of the AUKUS plan to construct ...
Insights from Cisco Live: What’s Cooking?

Insights from Cisco Live: What’s Cooking?

The recent Cisco Live event in Melbourne 2023, provided a platform for industry leaders to discuss the critical cybersecurity challenges facing our industry. The noted event included prominent figures from Cisco and other industry experts, shedding light on the complexities, innovations, and pressing issues within the cybersecurity sphere. A ...
Communication Is Key to IT Security

Communication Is Key to IT Security

The growing scope and severity of cyber threats targeting Australian businesses this past year has put a spotlight on the need for greater security measures. With more attention and support, now is the time for companies of all sizes to bolster their preparedness against emerging threats – and opening up internal dialogues across the business will be ...
Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Partnerships play a vital role in meeting customer demands and driving success for organisations. In a recent episode of the KBKast podcast, host Karissa Breen sat down with Raj Sharma, from Palo Alto Networks, to discuss the importance of strategic partnerships and the changing dynamics of the reseller ecosystem. From the rise of direct ...
The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

The Growing Need For Company Board Directors And Non-Executive Directors To Play A Proactive Role In Cybersecurity

Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most cyber secure nation by 2030. However, according to Apple, Australia is one of the top four countries for cyber-attacks - behind the US, the UK and Canada. With the government playing an increasingly proactive, and prominent role in ...
Robust Physical Security Includes Strong Data Privacy 

Robust Physical Security Includes Strong Data Privacy 

Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue technologies, towards modern digital infrastructure. At the same time, governments and citizens have become increasingly concerned about privacy implications.
Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Introduction Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity industry. In this article, we will delve into the dynamics of M&A within the cybersecurity sector, exploring both successful and unsuccessful instances. Additionally, we will provide insights for start-up and mid-market businesses ...
No results found.

In The News

BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent

New data from Identity Security Risk Assessments reveals critical blind spots in non-human identity posture BeyondTrust’s latest solution brings secrets into full view, just as Agentic AI spins up at scale
2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale

DPRK-nexus adversaries infiltrate 320+ companies using GenAI accelerated attacks; threat actors exploit AI agents, exposing autonomous systems as the next enterprise attack surface
Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Joint Collaboration Enables Real-Time Intelligence Sharing and Mutual Anti-Tamper Protections to Accelerate Ransomware Detection and Response
ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare For Coming AI Regulation

ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare For Coming AI Regulation

ASX listed cybersecurity firm, Excite Cyber is today urging Australian organisations to adopt ISO 42001 to ensure they are prepared for coming AI regulation.  
Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Email Threat Radar – July 2025 - During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats include: Tycoon PhaaS impersonating the Autodesk Construction Cloud for a credential phishing attack A ...
Trend Micro Reinvents Proactive Security with Digital Twin Technology

Trend Micro Reinvents Proactive Security with Digital Twin Technology

Innovation at the speed of agentic AI, built on NVIDIA AI, provides a data-driven foundation for supercharged decision-making
Nozomi Networks Names David Hope as Regional Vice President for APJ

Nozomi Networks Names David Hope as Regional Vice President for APJ

Industry veteran to lead APJ as Nozomi Networks expands regional investment to support growing demand in APJ.
SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA And Passwordless Authentication To SAP Users

SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA And Passwordless Authentication To SAP Users

The acquisition marks a significant milestone in SAP security innovation, as CyberSafe’s flagship TrustBroker® products will further enrich the SecurityBridge platform capabilities. A two-way integration enables customers to transition from password-based authentication to multi-factor authentication across the SAP technology stack, with full insight ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This