The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...

Antifragility – The Essential Strategy for Modern Cyber Defense
Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.

The Five Step Journey To Securing Australia’s Most Important Data Assets
Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and other financial entities, there’s additional motivation in the form ...

AI’s Transformative Role In Corporate Governance
Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, ...

Secure-By-Design Is A Significant Exercise, But The Rewards Are Significant, Too
Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation.

Cloud-Based Post-Quantum Cryptography (PQC) vs Local PQC: Not as Straightforward as You’d Think
As quantum computing advances, organisations face a critical choice in adopting Post-Quantum Cryptography (PQC): cloud-based or local deployment. This article explores the benefits of cloud-based PQC, including improved performance by offloading heavy computations, enhanced security managed by specialised providers, seamless scalability, and simplified ...
Holiday Shopping and the Dark Market Parallel
As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they aren’t the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing for their version of ‘steals’ on an assortment of unconventional goods and services. ...

Australian Businesses Reckon With The Rising Threat of Executives Being Deepfaked
With artificial intelligence playing a growing role in identity fraud and leading to mounting losses, organisations are under pressure to confront the challenge and act on it.
In The News
For the Third Consecutive Year, Check Point Software Demonstrates Industry’s Highest Threat Prevention Rate in Miercom’s Enterprise and Hybrid Mesh Firewall Security Report
Check Point’s Infinity Platform offers the best protection against the latest generation of cyberattacks, with a block rate of 99.9% on new malware, 99.7% phishing prevention rate, and 98% average block rate on high & critical intrusion events
Rapid GenAI Application Adoption Drives New Era of Application and Infrastructure Modernisation
Nutanix study reveals that GenAI is changing organisations priorities, with security and privacy being a primary concern
Pax8 Adds Foxit’s Innovative PDF and eSignature Solutions to its Cloud Marketplace
SYDNEY, AU (February 6, 2025) – Pax8, the leading cloud commerce marketplace, has added new offerings to the Pax8 Marketplace from Foxit, a leading provider of innovative PDF and eSignature products and services. With Foxit's advanced document management technology now available in the marketplace, Pax8’s global network of partners can now access ...
Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads
Bitdefender Labs has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers.
LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its ...
Tenable Comment on DeepSeek Ban In AU Government
Governments in the U.S, Italy, and now Australia have moved to ban access to DeepSeek, a Chinese-developed large language model (LLM), on government devices. These bans stem from concerns over data security and the potential exposure of sensitive information to the PRC.
However, blocking access to DeepSeek is not as simple as restricting its website ...
Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers
Kyndryl’s end-to-end SASE services will help customers drive adoption of Palo Alto Networks’ cloud-first, zero-trust solution for network security
CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security
Mutual customers will benefit from boosted endpoint threat detection and response capabilities
Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution
Unified security and observability enable continuous compliance and response automation for major cloud platforms
LAS VEGAS, NV, February 4, 2025 – Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..