The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Robust Physical Security Includes Strong Data Privacy
Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue technologies, towards modern digital infrastructure. At the same time, governments and citizens have become increasingly concerned about privacy implications.

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success
Introduction
Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity industry. In this article, we will delve into the dynamics of M&A within the cybersecurity sector, exploring both successful and unsuccessful instances. Additionally, we will provide insights for start-up and mid-market businesses ...

The New Ransomware Threat Targeting Global Institutions
The British Library falls victim to Rhysida, a ransomware group employing a "double extortion" tactic. With global ambitions and sophisticated techniques, Rhysida poses a significant threat to institutions worldwide. The rise of ransomware payments and cybercriminal sophistication is cause for concern. Stay tuned for more on Rhysida in our upcoming ...

Future of Work Predictions 2024
With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year.
Prediction: AI Will Be Your Best Work Buddy
One of the most exciting ideas for workplace productivity is the deployment of AI assistants that help employees become — and continue to be — efficient and effective. For example, ...

A Human Centric Tech Revolution in 2024
With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence.
Work Needs To Revolve Around Humans, Not The Other Way Around
Productivity ...

Businesses Need To Rewrite Their Identity Security Playbook For 2024
With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...
Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel
In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President & Chief Product Officer, shed light on the company's significant announcements and the profound advancements in the field of cybersecurity. Patel's insights underscore the pivotal role of artificial intelligence (AI) in revolutionising security, carving a ...

A Legal Take On The Cybersecurity Strategy 2023-2030
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For ...
No results found.
In The News
SailPoint and HCLTech Forge Partnership to Deliver Modern Identity Security at Enterprise Scale In the Age of AI
HCLTech named a SailPoint Global Delivery Admiral Partner for deep domain expertise, proven delivery methods, and commitment to governance, compliance and security excellence
Claroty Named to Forbes Cloud 100 for Fourth Consecutive Year
Claroty, the world’s leading cybersecurity company for cyber-physical systems (CPS) protection, has been listed on the Forbes 2025 Cloud 100 for the fourth consecutive year.
Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland
Brisbane, 5 September 2025 - In a significant step forward for sovereign cyber defence, The Hon. Steven Minnikin MP, Minister for Customer Services and Open Data and Minister for Small and Family Business, has officially opened Queensland headquartered Cube Cyber’s new Security Operations Centre (SOC) in Brisbane.
The Cube Cyber centre represents a ...
Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According To New Independent TEI Study
SYDNEY, AUSTRALIA – Sept. 5, 2025 – Boomi™, the leader in AI-driven automation, today announced the results of a new Total Economic Impact™ (TEI) study conducted by Forrester Consulting. The study found that organisations using the Boomi Enterprise Platform achieved a 347 per cent return on investment (ROI) and a net present value (NPV) of $9.8 million ...
Claroty Named a Leader In IoT Security By Leading Independent Research Firm
New analyst report gives Claroty highest score possible across 10 current offering and strategy criteria
Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy
Redwood City, CA – September 2, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of Brett Theiss as Chief Marketing Officer (CMO). As CMO, Theiss will shape and accelerate Check Point’s global growth agenda, strengthening brand presence, fuelling ...
Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links
SYDNEY, Australia – 4 September 2025 – Barracuda threat analysts have published a report on the latest techniques being used by the Tycoon phishing-as-a-service (PhaaS) kit to hide malicious links in emails. The techniques are designed to obscure, muddle and disrupt the structure of links, or URLs, with the aim of confusing automated detection systems ...
Veeam Launches Its First Fully Preconfigured, Software-only Appliance
Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, and Windows ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
