The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Unlocking Opportunities: Australian Talent in the US Job Market
A Conversation with Amy Meyer, Founder from Aussie Recruit on Overcoming Challenges and Thriving in the US
Protecting Production Lines – Why Now’s The Time For Local Manufacturers To Get Serious About Cybersecurity
In 2023, Australian manufacturers have much to contend with. Energy costs are surging and the prices of labour and raw materials have also risen, albeit not quite so dramatically, in most instances.
Small to medium sized players have been under particular pressure, according to accountancy firm Grant Thornton’s The State of Australian Manufacturing: ...

The Social Responsibility of Data Security
Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...

Soczilla Roadshow Launches in Australia and New Zealand
Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney.
The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond
BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.

The Security Threat Posed by ‘Zombie’ APIs
Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs).
The challenge of ‘zombie APIs’ was highlighted in the recent State of API ...

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity
The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.

Critical Infrastructure and IoT
The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
No results found.
In The News
AI Appreciation Day: Empowering Human Potential and Fortifying Cyber Defences
As we approach AI Appreciation Day, it's clear that artificial intelligence has seamlessly integrated into our daily lives, from personalised recommendations and GPS navigation to predictive text and advanced medical diagnostics. In cybersecurity, AI is proving invaluable, analysing vast datasets to distinguish threats and automating repetitive tasks ...
New EXL Survey Shows Most Australian Businesses Aren’t Ready for AI – But Expect It to Drive Growth
While a majority of respondents are aiming for business expansion, with 64% confident in their growth outlook, most are still in early or planning phases when it comes to adopting AI, setting data strategy, or building internal capability. Trust in AI is also low, with only 27% of respondents saying they feel confident in the accuracy of AI-generated ...
R&D and Manufacturing Capacity Expansion
DroneShield is making a more than $13 million initial investment via a multi-year lease and fitout commitment into a brand new 3,000sqm production facility in Sydney’s Alexandria, with expected opening in December 2025. This is in addition to 2,500sqm of R&D area in its headquarters, expanding its own annual production capacity to $900 million by ...
Wavelink Signs Distribution Agreement with Penguin Solutions to Enhance Critical Infrastructure and Edge Computing Capabilities in Australia and New Zealand
July 15, 2025 – Wavelink, an Infinigate Group company and leader in technology distribution, services, and business development in Australia and New Zealand (ANZ), has signed a distribution agreement with Penguin Solutions, a global provider of high-availability computing and edge infrastructure solutions. This partnership expands Penguin Solutions’ ...
Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security
July 15, 2025 – Trustwave, a global cybersecurity and managed security services leader, has announced the launch of Managed Phishing for Microsoft, an advanced service designed to help organisations using Microsoft Office 365 and Defender for Office proactively defend against the evolving threat of phishing attacks.
Phishing remains the most ...
Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation
Check Point’s Hybrid Mesh Security Platform recognised for plan to deliver AI-driven capabilities to automate network security functions
Kyndryl Partners with Microsoft to Launch the Kyndryl Microsoft Acceleration Hub to Drive Customer Innovation and Digital Transformation
New Hub combines Kyndryl Consult expertise with Microsoft technologies to enable AI-first consulting capabilities and engagements
Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments
2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments
The new report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta—but substantial score improvements for users applying Purple Knight’s expert ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
