The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

​Most organisations believe their risk is under control. Endpoints are hardened. Networks are monitored. Identity systems are layered and audited. Yet breaches continue and, increasingly, they don’t start where defenders are looking. Jeff Lindholm, Chief Revenue Officer at Lookout, talks about a shift that has been quietly reshaping cyber risk. Mobile ...
Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

In this byline, Sam Salehi, Managing Director ANZ at Qualys, shares his 2026 predictions for the cybersecurity industry, outlining the shifts that will define the CISO agenda as security teams grapple with an excess of signals, expanding AI-driven risk and rising board expectations. Sam argues that success in the year ahead will hinge on CISOs moving ...
Australia’s Cyber Laws Just Changed on Who Takes the Hit

Australia’s Cyber Laws Just Changed on Who Takes the Hit

There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over. With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...
How to Build Secure Communications Beyond “End-to-End” Network Encryption

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data ...
NIAP-Certified Security – A Foundation for Trusted Communications

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that ...
Australia’s AI Future Is Being Built in the Cloud

Australia’s AI Future Is Being Built in the Cloud

When Amazon Web Services, more commonly known as AWS, planted their flag on Australian soil 13 years ago, cloud computing was still emerging. Today, it powers almost everything we do day to day; consumer banking, enterprise platforms as well as systems tied to national security. AI adoption accelerates across Australia and New Zealand, the question is ...
Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated ...
No results found.

In The News

NinjaOne Adds Almost 1,000 Healthcare Customers and Drives Nearly 70% Year-Over-Year Revenue Growth

NinjaOne Adds Almost 1,000 Healthcare Customers and Drives Nearly 70% Year-Over-Year Revenue Growth

NinjaOne had announced significant momentum in the healthcare sector, with almost a thousand new healthcare customers moving to NinjaOne in the past year and nearly 70% year-over-year growth in healthcare-related annual recurring revenue (ARR). The growth underscores increasing demand from healthcare organisations seeking to improve patient care ...
TrendAI Helps Drive Global Takedown of Tycoon 2FA MFA-bypass Phishing Service

TrendAI Helps Drive Global Takedown of Tycoon 2FA MFA-bypass Phishing Service

Long-term intelligence tracking and cross-industry coordination disrupt a major identity‑based cybercrime operation
Radware Announces Another DDoS Industry First – Encrypted Attack Blocking Without SSL Decryption

Radware Announces Another DDoS Industry First – Encrypted Attack Blocking Without SSL Decryption

Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the availability of its Web DDoS Protection for Encrypted Traffic as a cloud-based service that does not require SSL certificate sharing or traffic decryption. With this release, Radware believes it is the only security ...
Nord Security Partners with Wavelink to Strengthen Cybersecurity in ANZ

Nord Security Partners with Wavelink to Strengthen Cybersecurity in ANZ

Nord Security, a global cybersecurity powerhouse, today announced a distribution partnership with Wavelink to strengthen channel support for managed service providers (MSPs) and resellers across Australia and New Zealand, helping them better protect small and mid-sized businesses (SMBs) as the cyber threat landscape becomes more sophisticated and ...
Closing the Gender Gap: ESET Launches Fifth Year of Women in Cybersecurity Scholarship in Australia

Closing the Gender Gap: ESET Launches Fifth Year of Women in Cybersecurity Scholarship in Australia

SYDNEY - March 6, 2026 - Ahead of International Women’s Day on March 8, ESET announced the opening of registrations for the ESET Women in Cybersecurity Scholarship in Australia, inviting eligible female students pursuing IT or cybersecurity degrees to apply and join a global network of women shaping the future of the field. 2026 marks the fifth year ...
Check Point Launches a Secure AI Advisory Service to Help Enterprises Govern and Scale AI Transformation

Check Point Launches a Secure AI Advisory Service to Help Enterprises Govern and Scale AI Transformation

New service provides a structured governance, regulatory alignment, and risk mitigation to accelerate responsible AI adoption REDWOOD CITY, CA. March 5, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader in cyber security solutions, today announced a Secure AI Advisory Service, a new service designed to help ...
Bitdefender Uncovers “Vibeware”: A New AI-Driven APT Attack Strategy Flooding South Asia with Polyglot Implants

Bitdefender Uncovers “Vibeware”: A New AI-Driven APT Attack Strategy Flooding South Asia with Polyglot Implants

SYDNEY, 6 March 2026 – Bitdefender have uncovered a new AI-assisted malware development model dubbed “vibeware”, revealing how a Pakistan-aligned threat actor is industrialising cyberattacks across South Asia by rapidly generating large volumes of disposable malware variants. The activity is linked with medium confidence to APT36, also known as ...
LevelBlue Expands Vulnerability And Exposure Management Capabilities For MSSP And MSP Partners With Tenable

LevelBlue Expands Vulnerability And Exposure Management Capabilities For MSSP And MSP Partners With Tenable

New offerings deliver scalable, Tenable-powered exposure management across the partner ecosystem  March 6, 2026 — LevelBlue, the world’s largest pure-play provider of managed security services, has announced Exposure Management for Partners, featuring expanded vulnerability and exposure management capabilities for managed security service provider ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This