The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

66% of Malware Is Delivered Through PDFs, New Report From Palo Alto Networks Unit 42 Finds

66% of Malware Is Delivered Through PDFs, New Report From Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe Are bit.ly (or Tiny URL) Links?

How Safe Are bit.ly (or Tiny URL) Links?

What Are Shortened or Tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to Remove the Roadblocks to Going Passwordless

How to Remove the Roadblocks to Going Passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to Remove the Roadblocks to Going Passwordless

How to Remove the Roadblocks to Going Passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to Protect Against Double-extortion Ransomware Attacks

How to Protect Against Double-extortion Ransomware Attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to Protect Against Double-extortion Ransomware Attacks

How to Protect Against Double-extortion Ransomware Attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, and I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, and I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
No results found.

In the News

McLaren Racing Announces Trend Micro as an Official Partner of the McLaren Formula 1 Team 

McLaren Racing Announces Trend Micro as an Official Partner of the McLaren Formula 1 Team 

Highw-performance alliance built to stay ahead, on track and in cybersecurity
Check Point Software Technologies Appoints David Caspari as Managing Director for Australia & New Zealand (ANZ) to Drive Growth and Cyber Leadership

Check Point Software Technologies Appoints David Caspari as Managing Director for Australia & New Zealand (ANZ) to Drive Growth and Cyber Leadership

Sydney, Australia – September 3, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of industry leader David Caspari as Managing Director for Australia and New Zealand (ANZ). Caspari will lead Check Point’s business in the region, expanding customer and ...
ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape

ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape

ACT Cyber Launches to Strengthen Australia’s Microsoft Cloud Security Landscape
F5 Recognised as Leader in Web Application and API Protection (WAAP) in the KuppingerCole 2025 Leadership Compass Report

F5 Recognised as Leader in Web Application and API Protection (WAAP) in the KuppingerCole 2025 Leadership Compass Report

F5 Application Delivery and Security Platform (ADSP) showcased as a leader across multiple WAAP categories
Cohesity Appoints James Eagleton as Managing Director for Australia and New Zealand

Cohesity Appoints James Eagleton as Managing Director for Australia and New Zealand

SYDNEY, Australia – September 1, 2025 – Cohesity, the leader in AI-powered data security, today announced the appointment of James Eagleton as Managing Director for Australia and New Zealand (ANZ). In this role, Eagleton will be responsible for driving Cohesity’s overall business strategy, sales operations, and growth initiatives across the ANZ ...
Macquarie Cloud Services Ranked Best Workplace in Australia

Macquarie Cloud Services Ranked Best Workplace in Australia

Macquarie Cloud Services today announced it has ranked number one in the 30-99 employee category in Best Workplaces in Australia 2025 List. Macquarie Cloud Services re-earned its place at the top of the list following the rigorous assessment of confidential employee feedback and detailed analysis of the organisation’s culture. Best Workplaces are ...
Proofpoint’s 2025 Voice of the CISO Report: Heightened AI Risk and Cyberattack Threats Fuel CISO Burnout in Australia

Proofpoint’s 2025 Voice of the CISO Report: Heightened AI Risk and Cyberattack Threats Fuel CISO Burnout in Australia

• 77% of Australian CISOs anticipate a material cyberattack in the next year, with human risk and GenAI-driven data loss topping their concerns • Three-quarters (76%) experienced a material data loss in the past year (up from 39% in 2024)
KnowBe4 Releases Cybersecurity Awareness Month Resource Kit at No Cost

KnowBe4 Releases Cybersecurity Awareness Month Resource Kit at No Cost

KnowBe4 launches its seventh resource kit for cybersecurity awareness month to empower individuals & organisations to "Secure Our World" with practical tools and training 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This