The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Five Telecom Habits Of Smart Small Businesses

Five Telecom Habits Of Smart Small Businesses

Introduction Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on. Consolidate Where It Makes Sense It’s ...
Tool Sprawl a Silent Sabotage?

Tool Sprawl a Silent Sabotage?

Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains. Ask an enterprise security leader what really keeps them up at night, and the answer is rarely that easy, unfortunately. For Rao, the narrative isn’t one of failure, but the evolution. “We are ...
Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs

Rethinking The Office Phone: Why Cloud PBX Is The Future For SMBs

Overview For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age.  Cloud-based PBX (Private Branch Exchange) ...
The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...
Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Summary Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...
Why Does Recovery Take So Long? But It Doesn’t Have To

Why Does Recovery Take So Long? But It Doesn’t Have To

Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline. I sat down ...
NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
Alleged Russian Hackers Target Norwegian Dam

Alleged Russian Hackers Target Norwegian Dam

Why this cyber attack on a Norwegian dam should have you paying attention
No results found.

In The News

Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis today announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical Identity infrastructure, including Microsoft Active Directory assets, from cyberattacks.
ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

New Capabilities in Log360 Tackle False Positives, Keep Threat Coverage Current, and Enable Scaling With Enterprise Demand
Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity today announced multiple cyber resilience breakthroughs at the company’s Catalyst 1 Data Security Summit, extending its pioneering Five-Step Cyber Resilience Framework to companies and governments. These innovations include unmatched protection for compute, container, storage, and database workloads across the three leading hyperscale clouds, ...
New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

“To stay ahead of the curve, businesses across Australia and New Zealand need to prioritise reducing tool sprawl and data siloes so engineers can detect and resolve critical issues fast. With high-business impact outages costing up to $3 million per hour in lost revenue, organisations can no longer ignore the costs associated with maintaining the status quo.”
Arctic Wolf Enhances Threat Intelligence Plus to Strengthen Proactive Defense

Arctic Wolf Enhances Threat Intelligence Plus to Strengthen Proactive Defense

Sydney, Australia – Arctic Wolf®, a global leader in security operations, today announced enhancements to Arctic Wolf Threat Intelligence Plus, introducing a new capability that allows organisations to deploy a threat feed with the same high-fidelity indicators of compromise (IoCs) used by Arctic Wolf’s AI-powered Security Operations Center (SOC) ...
CyberArk Names Omer Grossman Chief Trust Officer and Head of CYBR Unit; Appoints Ariel Pisetzky as CIO

CyberArk Names Omer Grossman Chief Trust Officer and Head of CYBR Unit; Appoints Ariel Pisetzky as CIO

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced two executive appointments to strengthen its leadership team and support the company's growth and innovation strategy. Omer Grossman, who has served as CyberArk's Chief Information Officer since late 2022, has been appointed to the newly created role of Chief Trust ...
Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

AI-powered Risk-based Patching enables customers to identify, prioritize, and fix the vulnerabilities that matter most through a single unified platform
CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

System of autonomous agents reason, hunt, and take decisive action across the kill chain, supercharging analyst investigations and threat response
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This