The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Solving the Skills Shortage by Looking Within
Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC
IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.

Four Steps Organisations Can Take to Improve Cybersecurity Awareness
October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).

Five Common Challenges With Securing Cloud-based Applications
The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.

The Overlap Between Physical and Digital Security – How to Get Smart With Compliance
Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of ...

Espionage Fuels Global Cyberattacks
In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
Cybersecurity Incidents Are Now Full-Scale Crisis Management
Cybersecurity incidents have typically been viewed through a technical lens.

Research: A Deep Dive Into Stream-Jacking Attacks on YouTube
Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.
No results found.
In the News
Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2
Darktrace's latest investigation uncovered a novel campaign that blends traditional malware with modern devops technology. At the center of this campaign is a Python-based command-and-control (C2) framework hosted on GitHub CodeSpaces. This campaign also utilizes a Python based spreader with a multi-stage Docker deployment as the initial access vector. ...
BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy
Strategic leadership addition accelerates BeyondTrust’s innovation in identity security, machine IAM, and privileged access management (PAM).
Gaehtgens brings over a decade of Gartner expertise in identity security to BeyondTrust.
Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence
Dragos has launched Dragos Platform 3.0, which provides breakthrough capabilities that empower industrial defenders to act even faster and more confidently to protect against intensifying cyber threats.
Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management
Exposure Management Leadership Council created to mature exposure management into a proactive security discipline
Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner
INTEGRATEDXR company Vection Technologies Ltd (ASX:VR1) has announced has executed a $22.3m (scalable up to $29.5m at same conditions) multi-year master framework agreement with a repeat NATO-approved customer and partner operating within the European defence sector.
Highlights
$22.3m framework agreement executed with a repeat NATO-approved ...
Genetec Delivers Faster, Smarter Investigations in Security Center SaaS
New intelligent automation-powered investigation capabilities enable operators to quickly locate video evidence, understand context, and close cases in minutes.
Check Point Software Technologies Celebrates 2025 APAC Partner Excellence Awarding Australia’s DXC Technology as APAC Top Partner of the Year and S5 Technology Group as Workspace Security Partner of the Year
Sydney, 22 September 2025 - Check Point® Software Technologies Ltd., a pioneer and global leader of cyber security solutions, has announced its top-performing partners across the Asia Pacific region at the 2025 Check Point Software Technologies Asia Pacific Partner Conference held earlier this month in Hanoi, Vietnam.
The annual conference brought ...
Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create
Phishing-resistant MFA, enhanced privileged access, and identity-driven case management strengthen unified initial access, privilege control, and SOC response across human and agent identities
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
