The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Credential Stuffing – Industry Commentary From Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management Is Vital in Financial Services

Why Effective Digital ID Management Is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australia’s Water Utilities

Improving Cybersecurity Within Australia’s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
Australia’s New Defence Technology Law: A Strategic Move or a Threat to Global Collaboration?

Australia’s New Defence Technology Law: A Strategic Move or a Threat to Global Collaboration?

Australia is poised to enact a new law that imposes stringent regulations on sharing defence technology with foreign entities, with the notable exception of its AUKUS partners, Britain and the United States. This significant move is designed to align with U.S. export controls on defence technology, a critical component of the AUKUS plan to construct ...
Insights From Cisco Live: What’s Cooking?

Insights From Cisco Live: What’s Cooking?

The recent Cisco Live event in Melbourne 2023, provided a platform for industry leaders to discuss the critical cybersecurity challenges facing our industry. The noted event included prominent figures from Cisco and other industry experts, shedding light on the complexities, innovations, and pressing issues within the cybersecurity sphere. A ...
No results found.

In the News

Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Darktrace's latest investigation uncovered a novel campaign that blends traditional malware with modern devops technology. At the center of this campaign is a Python-based command-and-control (C2) framework hosted on GitHub CodeSpaces. This campaign also utilizes a Python based spreader with a multi-stage Docker deployment as the initial access vector. ...
BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

Strategic leadership addition accelerates BeyondTrust’s innovation in identity security, machine IAM, and privileged access management (PAM). Gaehtgens brings over a decade of Gartner expertise in identity security to BeyondTrust.
Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos has launched Dragos Platform 3.0, which provides breakthrough capabilities that empower industrial defenders to act even faster and more confidently to protect against intensifying cyber threats.
Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management

Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management

Exposure Management Leadership Council created to mature exposure management into a proactive security discipline
Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner

Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner

INTEGRATEDXR company Vection Technologies Ltd (ASX:VR1) has announced has executed a $22.3m (scalable up to $29.5m at same conditions) multi-year master framework agreement with a repeat NATO-approved customer and partner operating within the European defence sector. Highlights $22.3m framework agreement executed with a repeat NATO-approved ...
Genetec Delivers Faster, Smarter Investigations in Security Center SaaS

Genetec Delivers Faster, Smarter Investigations in Security Center SaaS

New intelligent automation-powered investigation capabilities enable operators to quickly locate video evidence, understand context, and close cases in minutes.
Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of the Year and S5 Technology Group as Workspace Security Partner of the Year

Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of the Year and S5 Technology Group as Workspace Security Partner of the Year

Sydney, 22 September 2025 - Check Point® Software Technologies Ltd., a pioneer and global leader of cyber security solutions, has announced its top-performing partners across the Asia Pacific region at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held earlier this month in Hanoi, Vietnam. The annual conference brought ...
Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Phishing-resistant MFA, enhanced privileged access, and identity-driven case management strengthen unified initial access, privilege control, and SOC response across human and agent identities
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This