The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Aligning Cybersecurity to Business Objectives Helps Drive Revenue Growth and Lower Costs of Breaches, Accenture Report Finds

Accenture State of Cyber Resilience 2023 report reveals key traits of “cyber transformers,” who make cybersecurity the cornerstone of their business transformation efforts
CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

CyberArk Survey: AI Tool Use, Employee Churn and Geo-Political Tensions Fuel Cyber Jeopardy

91% of Australian respondents experienced at least one ransom attack
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.
Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Innovation and Collaboration: Working Towards a Cohesive Solution for Cybersecurity in Australia

Conversations are the fulcrum upon which we, as an industry, identify and begin to solve the challenges facing Australian businesses.  Recently, at the Australia-Israel Chamber of Commerce (AICC) event in Sydney, it was made clear that Australia has the opportunity to emerge as a dominant force when it comes to innovation.  This event was hosted ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 2)

As the latest phishing techniques are more sophisticated than ever before, general anti-phishing tips cannot safeguard you from becoming a victim. High-quality emails, confusing branding of domain names and poor user interfaces all play right into the hands of the cybercriminals. In the following article, we will showcase a range of real-world phishing ...
Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

Why Outdated Anti-Phishing Advice Leaves You Exposed – Stories from the Trenches (Part 1)

We already know that phishing is a significant threat to businesses and individuals. Anti-phishing tips, such as “always hover over the link in an email before clicking” or “be wary of emails with poor grammar”, are meant to help us avoid being tricked by phishing emails. These tips have been circulating on the internet for over a decade, but sadly, ...
The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
No results found.

In The News

New Cyber Threat ‘Hazy Hawk’ Hijacks Major Domains – Are You At Risk?

New Cyber Threat ‘Hazy Hawk’ Hijacks Major Domains – Are You At Risk?

Sydney, Australia, 21 May, 2025 - Subdomain hijacking through abandoned cloud resources is an issue that probably every major organisation has experienced, and these attacks are on the rise. Infoblox Threat Intel has tracked some of this activity to a threat actor, dubbed Hazy Hawk, that uses hijacked domains to conduct large-scale scams and malware ...
F5 Expands Strategic Collaboration With Red Hat to Enable Scalable, Secure Enterprise AI

F5 Expands Strategic Collaboration With Red Hat to Enable Scalable, Secure Enterprise AI

Solutions address key challenges in enterprise AI adoption—enabling secure model serving, scalable data movement, and real-time inference across environments SYDNEY, AUSTRALIA, MAY 21, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, today announced an expanded collaboration with Red Hat, the world’s leading ...
Macquarie Telecom Launches VeloCloud Partner Channel In Landmark Agreement

Macquarie Telecom Launches VeloCloud Partner Channel In Landmark Agreement

Macquarie Telecom today announced it has signed a first-of-its-kind agreement with VeloCloud to provide its SD-WAN technology to managed service providers (MSPs) across Australia.   The initial four-year agreement will be supported by an investment – worth an estimated A$30 million – by Macquarie Telecom, enabling it to offer the best ...
F5 Delivers Scalable And Secure Cloud-Native Network Functionality For AI And High-Bandwidth Applications

F5 Delivers Scalable And Secure Cloud-Native Network Functionality For AI And High-Bandwidth Applications

New F5 BIG-IP NEXT CNF 2.0 optimises apps and APIs in Kubernetes environments SYDNEY, AUSTRALIA, MAY 21, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, today unveiled F5 BIG-IP Next Cloud-Native Network Functions (CNF) 2.0, an evolved solution that significantly enhances the capabilities of the F5 ...
Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI

Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI

Now in Limited Availability, Extreme Platform ONE helps reduce manual tasks by up to 90 percent, offering the deepest and widest network visualisation and industry’s simplest licensing PARIS, FRANCE, EXTREME CONNECT--May 20, 2025: Extreme Networks, Inc. (NASDAQ: EXTR) today launched new capabilities within Extreme Platform ONE™, now in Limited ...
GitHub Introduces Coding Agent For GitHub Copilot

GitHub Introduces Coding Agent For GitHub Copilot

At Microsoft Build 2025, GitHub introduced a new, enterprise-ready coding agent for Copilot – integrated, responsible and secured by GitHub’s control layer
Teradata Completes IRAP Assessment for VantageCloud at PROTECTED Level

Teradata Completes IRAP Assessment for VantageCloud at PROTECTED Level

Newest Assessment Applies to VantageCloud Lake on AWS, Azure and Google Cloud, and Permits Teradata Cloud Offerings for Government Projects
Oracle EU Sovereign Cloud Helps Organisations Across Germany Securely Manage Critical Business Data

Oracle EU Sovereign Cloud Helps Organisations Across Germany Securely Manage Critical Business Data

RDV, BGN, and Vertama among public and private organisations taking advantage of sovereign cloud capabilities to run their sensitive workloads entirely within the borders of the EU
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This