The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...
Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.
The Unspoken Voice – CFOs Perspective On Security

The Unspoken Voice – CFOs Perspective On Security

The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...
Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...
Can Being “Compliant” Ever Top Being “Secure”?

Can Being “Compliant” Ever Top Being “Secure”?

My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
A Look Inside a Cybercriminal Execution Chain

A Look Inside a Cybercriminal Execution Chain

During a cyber attack, the process of compromising a machine rarely involves a single step.
The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
Unlocking Opportunities: Australian Talent in the US Job Market

Unlocking Opportunities: Australian Talent in the US Job Market

A Conversation with Amy Meyer, Founder from Aussie Recruit on Overcoming Challenges and Thriving in the US
No results found.

In The News

Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Sydney, Australia – 27 August 2025 – Axis Communications Oceania returns as headline sponsor of Security & Integrate 2025, showcasing intelligent technologies that transform insight into action.  In a world of complex security challenges, Axis is redefining safety, security, business intelligence, and operational efficiency with cutting-edge ...
Phishing Gangs Use Split and Nested QR Codes to Evade Detection In New Wave of ‘Quishing’ Attacks

Phishing Gangs Use Split and Nested QR Codes to Evade Detection In New Wave of ‘Quishing’ Attacks

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks.
Global CloudCon Summit Lands in Sydney

Global CloudCon Summit Lands in Sydney

Technology summit, CloudCon, is returning to Sydney for an immersive two-day experience with some of the world’s leading cloud and Kubernetes experts at the International Convention Centre on 9 and 10 September 2025.
Trend Micro Named A Leader in Exposure Management by IDC MarketScape

Trend Micro Named A Leader in Exposure Management by IDC MarketScape

Measurable reduction of operational silos and cyber risk delivered with Trend Vision One™ Cyber Risk Exposure Management
Introducing SailPoint Accelerated Application Management: A Breakthrough Approach to Manage and Govern Applications At Scale With Intelligence

Introducing SailPoint Accelerated Application Management: A Breakthrough Approach to Manage and Govern Applications At Scale With Intelligence

 An industry-first solution that combines application intelligence with systematic governance, enabling organisations to scale from dozens to hundreds of governed applications
Kinetic IT Named Pre-approved Supplier On WA Government’s IT Procurement Panel (CUATIS2024)

Kinetic IT Named Pre-approved Supplier On WA Government’s IT Procurement Panel (CUATIS2024)

August 26, 2025 - Kinetic IT has been appointed as a pre-approved supplier to the Western Australian Government’s CUATIS2024 Technology Infrastructure and Solutions panel, giving agencies a prequalified route to market that reduces procurement complexity and accelerates delivery. CUATIS2024 is the State Government’s new whole-of-government buying ...
NinjaOne Appoints Paul Redding as Head of MSP Partnerships

NinjaOne Appoints Paul Redding as Head of MSP Partnerships

NinjaOne has announced the appointment of Paul Redding to Head of MSP Partnerships. Redding will lead NinjaOne’s work with MSPs to accelerate growth and success for the company’s partners and customers. In this role, he will enable MSPs to scale their revenue, improve operational efficiency, and deliver increased value to their clients with automated ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This