The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why You Should Care About the Optus Breach If You’re A Customer

Why You Should Care About the Optus Breach If You’re A Customer

By now, you’ve likely seen the news about Optus, Australia's second-largest telco, having suffered a serious data breach, and the exposing of the private information of their millions of current and historic users through a malicious cyber-attack. What might not be clear to many, is the implications of the breach, and steps that can be taken toward ...
4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

4 Critical Factors in Software Due Diligence Audits for Mergers & Acquisitions (M&A)

The fervor of mergers and acquisitions (M&As) is robust in Asia Pacific, according to leading firm EY (source). The pandemic that has ravaged economies and industries worldwide, led to an acceleration of digital transformation across many industries, even traditionally stoic and static ones like hospitality, food, entertainment, aviation, and ...
Why SD-WAN Is Worth the Hype: Transform Your Network

Why SD-WAN Is Worth the Hype: Transform Your Network

Is the hype surrounding software-defined wide area networks (SD-WANs) worth it? SD-WAN allows IT engineers to centrally and intelligently manage or orchestrate wide-area networks using applications like SD-WAN controllers. As this fast up-and-coming technology continues to evolve, the best way to get the most of it is to understand its value and how it ...
MyCISO Launches in Style

MyCISO Launches in Style

Thursday, 18th August, I was the MC of the MyCISO Launch event hosted at the stunning ‘Shell House’ in Sydney, Australia. The team has been working on the development of the MyCISO product for a number of years, so the launch was a huge milestone for them. The launch opened with guest speaker, Jan Schreuder, Co-Founder of the Cyber Leadership ...

Security Fatigue: How Public Agencies Can Counter this Silent Menace

Every one of us knows one person or colleague who has a Post-it® Note full of passwords stuck to their monitor. Pre-pandemic, this is a one-in-ten case of security malpractice. But with how rapidly organisations have adopted digital solutions for remote work in the past two years, I’m willing to bet remote workers have passwords written down everywhere ...
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
What I’ve Learnt as an Entrepreneur

What I’ve Learnt as an Entrepreneur

A few things I’ve learnt over the years of being an Entrepreneur. This changes for me all the time, our challenges become easier to tackle and what scares us varies. Ultimately, you learn so much, and I wanted to share what I’ve learnt so far.
Australian Public: How to add 2FA

Australian Public: How to add 2FA

Two-Factor Authentication (2FA) is a necessity to ensure your daily security, no matter who you are. It can protect your social media accounts, banking accounts, email, or just about any other online service from being hacked. “How?” you ask. Well, let’s take a closer look at how it works and how to get it working fast. To keep your online identity as ...
No results found.

In The News

Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

Australia Under Attack As Higher Cyber Threat Activity Observed, Armis Report Finds

56% of respondents from Australia – higher than the global average (43%) – believe the threat is imminent, disclosing that they have already had to report an act of cyberwarfare. 79% of Australian IT leaders believe that global geopolitical tensions are only worsening the threat. In fact, over half (51%) have experienced more threat activity on their ...
BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

BeyondTrust Named a Leader in the 2025 GigaOm Radar Report for Cloud Infrastructure Entitlement Management (CIEM) Solutions

Company recognised for aggressive technical innovation and advanced features that focus on a platform solution, offering broad functionality and use case support Report highlights BeyondTrust’s strengths in securing cloud environments by enforcing least privilege access, identifying identity-based risks, and mitigating misconfigurations 
Kyndryl Expands Partnership With Google Cloud to Accelerate Mainframe Modernisation for Customers With Generative AI

Kyndryl Expands Partnership With Google Cloud to Accelerate Mainframe Modernisation for Customers With Generative AI

Kyndryl certified as a specialised Google Cloud partner for Gemini models
DriveSavers Expands to Australia, Offering Industry-Leading Data Recovery Services

DriveSavers Expands to Australia, Offering Industry-Leading Data Recovery Services

Sydney, 8 April 2025 - DriveSavers, a global leader in data recovery, has officially launched its Australian operations, bringing world-class data recovery solutions to individuals and businesses across the country. For over 40 years, DriveSavers has been at the forefront of data recovery, assisting clients ranging from Fortune 500 companies like ...
ExeQuantum Launches First Production-Ready HQC Post-Quantum API, Paving the Way for Cryptographic Diversity

ExeQuantum Launches First Production-Ready HQC Post-Quantum API, Paving the Way for Cryptographic Diversity

Melbourne, Australia, April 2025 - ExeQuantum, a cybersecurity company specializing in post-quantum cryptography, has officially launched a production-ready implementation of HQC-192, a NIST alternate finalist KEM, now accessible through a developer-facing API. This marks one of the first real-world deployments of HQC as a hardened, ...
Dynatrace on Azure Achieves “Protected” Status Following Australian Infosec Registered Assessor Program (IRAP) Assessment

Dynatrace on Azure Achieves “Protected” Status Following Australian Infosec Registered Assessor Program (IRAP) Assessment

New security status enables Dynatrace to assist all Australian Government agencies to deliver flawless and secure digital interactions on Microsoft Azure 
Cloudflare Acquires Outerbase to Expand Capabilities for Database and Agent Developer Experience

Cloudflare Acquires Outerbase to Expand Capabilities for Database and Agent Developer Experience

Sydney, Australia, April 8, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced the acquisition of Outerbase, a developer database company, to dramatically enhance the developer database experience across Cloudflare Workers. With this acquisition, building database-backed applications will be more approachable — ...
Cloudflare Accelerates AI Agent Development With The Industry’s First Remote MCP Server

Cloudflare Accelerates AI Agent Development With The Industry’s First Remote MCP Server

Sydney, Australia, April 8, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced several new offerings to accelerate the development of AI agents. Cloudflare now enables developers to easily build and deploy powerful AI agents with the industry’s first remote Model Context Protocol (MCP) server, generally ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This