The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats
Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.

Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted
Annual Phishing Report Highlights New and Evolving Phishing Campaigns Resulting from the Rise of AI Platforms, like ChatGPT, Urges Organisations to Adopt a Zero Trust Architecture

How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands
Amidst an environment of ever-increasing digital threats, growing numbers of organisations are turning to cyber insurance as a means of protecting against the fallout from attacks.

60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds
As cloud adoption continues to surge, with a projected market size of $830 billion in 2025, threat actors are increasingly targeting common vulnerabilities in the cloud.

Why SaaS Security Needs to Receive Constant Attention
ured by the promise of lower operating costs and improved flexibility, many businesses are continuing to increase their usage of software-as-a-service (SaaS) offerings.

Telecommunications Asset Deployments
The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives.
The foundational infrastructure that allows the communication between devices and the collection of this data for processing and interpretation ...

F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak
F5’s latest Curve of Convenience report shows, in the event of a data leak, majority of A/NZ consumers are unwilling to continue buying from the company involved (71%). Most of A/NZ (89%) are not comfortable with tracking mechanisms in their digital usage.

ISACA UPDATES CMMI MODEL WITH THREE NEW DOMAINS THAT HELP ORGANISATIONS IMPROVE QUALITY AND PERFORMANCE
Updated CMMI version addresses data management, people management, and remote/virtual workforce effectiveness.
No results found.
In The News
Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud
Proofpoint, Inc., a leading cybersecurity and compliance company, has today released new research showing almost one in four (23%) of Australia’s top-ranked hospitals is still lagging behind on basic cybersecurity measures, subjecting patients, healthcare professionals, and stakeholders to a higher risk of email fraud. While the data shows some ...

ExeQuantum and CyberWaze Announce Strategic Partnership to Bring Post-Quantum Cryptography to Global Cybersecurity
Melbourne, Australia & Dubai, UAE – March 2025 – ExeQuantum, a leader in Post-Quantum Cryptography (PQC) solutions, has officially partnered with CyberWaze, a global cybersecurity consulting and managed security services provider. This collaboration marks a significant milestone in the adoption of quantum-resistant security, ensuring businesses ...
Cybersecurity Needs Diversity: ESET’s 2025 Scholarship to Empower Women Leaders
Since its launch in 2016, the ESET Women in Cybersecurity Scholarship has supported over 28 women worldwide in pursuing careers in technology. Now expanding to Singapore and India in 2025, alongside the U.S., Canada, Australia, and the U.K., the initiative continues to build a more inclusive and diverse cybersecurity workforce globally.
Sovereign Australian Prime Alliance Welcomes Much Needed Reforms to Commonwealth Procurement Rules
The Sovereign Australian Prime Alliance (SAPA) congratulates the Albanese Government on its announcement today of much needed reforms to the Commonwealth Procurement Rules to define an Australian business, in the context of the Commonwealth procurement framework as:
“a business, including any parent business, that:
has 50% or more Australian ...
Bitdefender Joins the AWS ISV Accelerate Program
Bitdefender today announced it has joined the Amazon Web Services (AWS) Independent Software Vendor (ISV) Accelerate Program, a global co-sell initiative designed for AWS partners offering software solutions that run on or integrate with AWS and are sold through the AWS Marketplace. The program fosters deep collaboration between Bitdefender and AWS, ...
Western Australia Police Force Bolsters Officer and Community Safety With New Number Plate Recognition Capabilities
Western Australia Police Force (WA Police Force) is conducting faster and better-informed investigations and road policing throughout the state through the addition of automatic number plate recognition (ANPR) capability within Motorola Solutions’ PSCore mobile application.
The expanded app has been deployed in more than 80 police vehicles and ...
Wavelink Signs Distribution Agreement With N-able, Strengthening Data Protection and Security Offerings In Australia and New Zealand
March 06, 2025 — Wavelink, an Infinigate Group company and Australian and New Zealand (ANZ) leader in technology distribution, channel services, and business development, has signed a distribution agreement with N-able, a global leader in comprehensive, scalable IT service management solutions. This agreement expands N-able’s reach into the Australian ...
Building Cyber Resilience With Yubico and Microsoft
In today’s digital landscape, cyber threats are evolving at an unprecedented pace: every second, a phishing attack takes place. In fact, over 80% of these attacks are the result of stolen login credentials and almost 70% of phishing attacks relied on AI last year alone.
Recent data from Microsoft Entra also reveals a staggering increase in attempted ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..