The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Our Cybersecurity Defences Are Crumbling

Why Our Cybersecurity Defences Are Crumbling

According to Michael Loewy, Co-Founder of Tide and a veteran in the field of cybersecurity, the reality is that our cybersecurity defences are crumbling."The industry is broken," he declares.What's broken about it?"Just open the news," he urges, pointing to the incessant barrage of headlines detailing mass data breaches and ...
From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown

From Reactive To Proactive Defence In Critical Infrastructure: How AI-Powered Threat Intelligence Uncovers The Unknown

Nadir Izrael, Co-Founder & CTO, Armis explains how AI-powered threat intelligence can better protect critical infrastructure and national security, as Australian organisations face enhanced cyber security obligations.
Data Privacy Day – Qualys Shares Insights For Effective Data Security

Data Privacy Day – Qualys Shares Insights For Effective Data Security

Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.
Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly complex and sophisticated. The developers behind these phishing kits invest ...
Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.
Cybersecurity In 2025: What Will And Needs To Transpire

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand ...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks, or "Tony" as I’ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel. Reynolds’ belief and metaphor he goes by is: ...
Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Cloud-Native Application Protection Platforms (CNAPPs) are a game changer in cloud security. CNAPPs are rapidly becoming the central nervous system of cloud defence, offering businesses a comprehensive solution to manage risk in today’s fast-changing digital environment.
No results found.

In The News

ColorTokens Partners with Wipro to Enhance Cyber Resilience with a Breach Ready Security Solution for Global Enterprises

ColorTokens Partners with Wipro to Enhance Cyber Resilience with a Breach Ready Security Solution for Global Enterprises

SAN JOSE, Calif., – March 13, 2025:  ColorTokens Inc., a global leader in enterprise microsegmentation, today announced a strategic partnership with Wipro Limited, a leading technology services and consulting company, to launch Breach Ready Security Solution — an AI-powered Zero Trust microsegmentation security defense solution tailored for global ...
Kaseya Continues Strong Momentum in Q1 with New Product Innovations and Major Award Wins

Kaseya Continues Strong Momentum in Q1 with New Product Innovations and Major Award Wins

Sydney – March 17, 2025 – Kaseya, the leading global provider of AI-powered cybersecurity and IT management software, has released several major technology innovations in Q1 that continue to fuel the company’s strong growth. After delivering its best-ever financial results in 2024, Kaseya’s momentum continued with the launch of new AI-driven product ...
New CyberArk Research: Rapid Growth of Machine Identities, AI Adoption and Cloud Native Innovations Leave Organisations More Vulnerable to Attacks

New CyberArk Research: Rapid Growth of Machine Identities, AI Adoption and Cloud Native Innovations Leave Organisations More Vulnerable to Attacks

77% of security leaders view securing machine identities as vital to protecting the future of AI 
Bitdefender Threat Debrief | March 2025

Bitdefender Threat Debrief | March 2025

Bitdefender has combined information from openly available sources (OSINT) – including news reports and research – with data we gather by analysing Data Leak Portals (DLPs), websites where ransomware groups post details about their victims to develop our March 2025 Threat Debrief. It’s important to remember that we can't independently verify all of ...
Palantir and Databricks Announce Strategic Product Partnership to Deliver Secure and Efficient AI to Customers

Palantir and Databricks Announce Strategic Product Partnership to Deliver Secure and Efficient AI to Customers

Partnership combines Palantir’s Artificial Intelligence Platform (AIP) and Databricks’ Data Intelligence Platform to accelerate the production of AI applications and reduce TCO
Ghost in the Router: China-Linked Espionage Group UNC3886 Targets Juniper Networks

Ghost in the Router: China-Linked Espionage Group UNC3886 Targets Juniper Networks

Cybersecurity firm Mandiant, Google Cloud's threat intelligence division, has uncovered a sophisticated cyber espionage campaign by the China-linked hacking group UNC3886, which has been targeting end-of-life Juniper Networks routers with custom malware.
Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats

Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats

Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats 
Unlocking AI’s Full Potential: EXL’s “AI in action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Unlocking AI’s Full Potential: EXL’s “AI in action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Building on the success of previous AI in Action events, this year’s edition will bring together visionary leaders, AI experts, and industry professionals from banking, insurance, utilities, retail, technology, transportation, and more.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This