The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...
Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...
Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.
The Unspoken Voice – CFOs Perspective On Security

The Unspoken Voice – CFOs Perspective On Security

The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...
Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...
Can Being “Compliant” Ever Top Being “Secure”?

Can Being “Compliant” Ever Top Being “Secure”?

My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
A Look Inside a Cybercriminal Execution Chain

A Look Inside a Cybercriminal Execution Chain

During a cyber attack, the process of compromising a machine rarely involves a single step.
The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
No results found.

In The News

Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative

Joint Collaboration Enables Real-Time Intelligence Sharing and Mutual Anti-Tamper Protections to Accelerate Ransomware Detection and Response
ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare For Coming AI Regulation

ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare For Coming AI Regulation

ASX listed cybersecurity firm, Excite Cyber is today urging Australian organisations to adopt ISO 42001 to ensure they are prepared for coming AI regulation.  
Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide

Email Threat Radar – July 2025 - During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats include: Tycoon PhaaS impersonating the Autodesk Construction Cloud for a credential phishing attack A ...
Trend Micro Reinvents Proactive Security with Digital Twin Technology

Trend Micro Reinvents Proactive Security with Digital Twin Technology

Innovation at the speed of agentic AI, built on NVIDIA AI, provides a data-driven foundation for supercharged decision-making
Nozomi Networks Names David Hope as Regional Vice President for APJ

Nozomi Networks Names David Hope as Regional Vice President for APJ

Industry veteran to lead APJ as Nozomi Networks expands regional investment to support growing demand in APJ.
SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA And Passwordless Authentication To SAP Users

SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA And Passwordless Authentication To SAP Users

The acquisition marks a significant milestone in SAP security innovation, as CyberSafe’s flagship TrustBroker® products will further enrich the SecurityBridge platform capabilities. A two-way integration enables customers to transition from password-based authentication to multi-factor authentication across the SAP technology stack, with full insight ...
Boomi Brings Sovereign Data Integration to Australia

Boomi Brings Sovereign Data Integration to Australia

New Sydney-based deployment delivers fast, secure, and compliant data movement for enterprises managing AI, analytics, and regulatory risk
Bitdefender Launches Comprehensive Cybersecurity Advisory Services for Businesses

Bitdefender Launches Comprehensive Cybersecurity Advisory Services for Businesses

New Offerings Including Cybersecurity Advisory Retainer, Risk/Compliance Assessments and Expert-Led Strategic Guidance Enhance Cybersecurity Posture for Organisations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This