The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

5 Reasons Why You Shouldn’t Just Build the Solution

5 Reasons Why You Shouldn’t Just Build the Solution

For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
From Fluff to Facts: How You Can Measure Innovation

From Fluff to Facts: How You Can Measure Innovation

Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers

3 Subtle Indicators of Major Innovation Blockers

Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia Set to Follow the UK, for Banking Liabilities?

Is Australia Set to Follow the UK, for Banking Liabilities?

As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware Is Delivered Through PDFs, New Report From Palo Alto Networks Unit 42 Finds

66% of Malware Is Delivered Through PDFs, New Report From Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe Are bit.ly (or Tiny URL) Links?

How Safe Are bit.ly (or Tiny URL) Links?

What Are Shortened or Tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
No results found.

In the News

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, With 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, With 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates 

A new IDC InfoBrief, “Agentic Automation: Unlocking Seamless Orchestration for the Modern Enterprise”, sponsored by UiPath (NYSE: PATH), a global leader in agentic automation, has revealed 41% of Australian organisations are already using agentic AI and another 50% are planning to use it in the next six months.
CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report

Recognition Cites CyberArk’s Innovation Focus, Platform Capabilities and Bold Vision 
Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability

Company positioned closest to the centre of the Radar, underscoring its ability to help customers understand their dynamic cloud environments beyond the capacity of competitive solutions
Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board

ISACA, the global professional association supporting digital trust professionals, has announced the appointment of Australian cybersecurity expert Jamie Norton as Vice Chair of its 2025–2026 Board of Directors. Norton, currently Chief Information Security Officer (CISO) for the Australian Securities and Investments Commission (ASIC), steps into the ...
Fortinet Expands FortiCloud With Identity, Secure Storage, and Communication Services to Power the Modern Enterprise

Fortinet Expands FortiCloud With Identity, Secure Storage, and Communication Services to Power the Modern Enterprise

New services enhance identity management, secure file storage and recovery, and communication, advancing the Fortinet Security Fabric and global cloud network vision 
Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership

Bug bounty program incentivises security research to make customers and industry safer 
Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats

Elastic AI SOC Engine (EASE) reduces alert fatigue and investigation time by integrating context-aware AI with existing SIEM and EDR tools
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This